Dynamically Provisioning Isolation in Hierarchical Architectures
نویسندگان
چکیده
Physical isolation provides tenants in a cloud with strong security guarantees, yet dedicating entire machines to tenants would go against cloud computing’s tenet of consolidation. A fine-grained isolation model allowing tenants to request fractions of dedicated hardware can provide similar guarantees at a lower cost. In this work, we investigate the dynamic provisioning of isolation at various levels of a system’s architecture, primarily at the core, cache, and machine level, as well as their virtualised equivalents. We evaluate recent technological developments, including post-copy VM migration and OS containers, and show how they assist in improving reconfiguration times and utilisation. We incorporate these concepts into a unified framework, dubbed SafeHaven, and apply it to two case studies, showing its efficacy both in a reactive, as well as an anticipatory role. Specifically, we describe its use in detecting and foiling a system-wide covert channel in a matter of seconds, and in implementing a multi-level moving target defence policy.
منابع مشابه
On the Use of Migration to Stop Illicit Channels
Side and covert channels (referred to collectively as illicit channels) are an insidious affliction of high security systems brought about by the unwanted and unregulated sharing of state amongst processes. Illicit channels can be effectively broken through isolation, which limits the degree by which processes can interact. The drawback of using isolation as a general mitigation against illicit...
متن کاملEnergy Aware Resource Management of Cloud Data Centers
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...
متن کاملAvailability-Guaranteed Service Provisioning Employing a Generalized Path-Protection Model in WDM Networks
Traffic grooming deals with efficiently packing/unpacking low-speed connections onto high-capacity trunks. We examine traffic grooming for optical mesh networks by reviewing grooming-node architectures, traffic models, grooming policies, novel graph models, survivable grooming, and hierarchical switching, etc. @2003 Optical Society of America OCIS codes: (060.4250) Networks; (060.4510) Optical ...
متن کاملAn Implementation of Hierarchical Inter-domain Routing in the context of UCLPv2
As customer-owned and managed optical networks gain more popularity with large enterprises and institutions, the need to enable end-users to dynamically provision and configure network resources inspires the development of the second version of User Controlled Lightpath Provisioning System (UCLPv2). The UCLPv2 software is based on a service-oriented architecture in which network resources are e...
متن کاملSimulation Comparison of Hierarchical and Flat Ad Hoc Networks
Traditional ad hoc networks have flat architecture, which suffers from poor scalability. Theoretical analysis and experimental results imply that throughput for each node decreases rapidly toward zero while the number of nodes increases in such architecture. Hierarchical architecture in ad hoc networks present a trade off between cellular networks and pure ad hoc networks, in that data may be f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015