Virtual Control Storage - Security Measures in VM/370
نویسنده
چکیده
architecture of a virtual machine system has speciJic advantages over that of conventional operating systems because virtual machines are well separated from one another and from the control program. This structure requires that a protected, multiuser resource manager be placed in a distinct virtual machine because the protection domain and scheduling unit are one erztity, the virtual machine. But cooperation between distinct virtual machines necessarily entails scheduling overhead and often delay. ~ This paper describes an experimental extension to VMl370 ' whereby a distinct execution and data domain (Virtual Control Storage) is made available to virtual machines that require access to a resource manager, without requiring a change in the scheduling unit. Thus scheduling overhead and delays are avoided when transition is made between user program and resource manager. A mechanism is described for exchanging data between execution domains by means of address-space mapping. For the purposes of this paper, the security of a computing system relates to its ability to perform according to design objectives and administrative policies, regardless of the use to which it is subjected, particularly in the face of conscious attempts to sub-vert its protection mechanisms. Examples of design objectives and administrative policies are the ability to allow access to data only on presentation of a password by the user or through the mediation of some system (or user) program, charging of each user according to a function of his central processor and his main and auxiliary storage usage, and scheduling the usage of system resources according to a " fair share " algorithm (or perhaps some other). The system's protection mechanisms are the components that enforce the objectives and policies. If those mechanisms are subverted, the objectives and policies are not met, and the system is said to be not secure. It is generally acknowledged that no commercially significant system can be confidently termed secure by this definition.lV6 Copyright 1979 by International Business Machines Corporation. Copying is permitted without payment of royalty provided that (1) each reproduction is done without alteration and (2) the Journd reference and IBM copyright notice are included on the first page. The title and abstract may be used without further permission in computer-based and other information-service systems. Permission to republish other excerpts should be obtained from the Editor. AWANASIO Figure 1 Typical configuration of virtual machines controlled by one VMM. VM1 VMM 1 In this paper, improving the security (or …
منابع مشابه
A security retrofit of VMl370
The VM/370 Security Retrofit Program is a continuing research and development initiative, funded by the Defense Advanced Research Projects Agency (DARPA), with additional funding provided by the Canadian Department of N ational Defense. The program's primary goal is the security retrofit of a popular commercial operating system, VM/370. 1 Two approaches were originally planned: (1) the design o...
متن کاملThe Origin of the VM/370 Time-Sharing System
VM/370 is an operating system which provides its multiple users with seemingly separate and independent IBM System/ 370 computing systems. These virtual machines are simulated using IBM Systeml370 hardware and have its same architecture. In addition, VM/370 provides a single-user interactive system for personal computing and a computer network system for information interchange among interconne...
متن کاملAttack Trends the Early Days Ghost in the Virtual Machine
The early days The origins of VMs go back almost as far as modern computing itself. Born to optimize usage of expensive computing resources and provide users with a fully dedicated and interactive computer system, the early 1960s experiences in time-sharing systems at MIT, IBM, Bolt Beranek and Newman (now BBN Technologies), and the University of California, Berkeley, laid the foundations on wh...
متن کاملPouring Cloud Virtualization Security Inside Out
In this article, virtualization security concerns in the cloud computing domain are reviewed. The focus is toward virtual machine (VM) security where attacks and vulnerabilities such as VM escape, VM hopping, cross-VM side-channel, VM-based rootkits (VMBRs), VM mobility, and VM remote are mentioned and discussed according to their relevance in the clouds. For each attack we outline how they aff...
متن کاملA Security State Transfer Model for Virtual Machine Migration in Cloud Infrastructure
Virtual machine migration (VMM) is one of important services is used as a tool to facilitate system maintenance, load balancing, fault tolerance, on-demand service offerings. Live VMM transfers an active Virtual Machine (VM) from one physical host to another across different data centres. It involves a sequence of operations in iteration under a specific protocol/method for migrating execution ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IBM Systems Journal
دوره 18 شماره
صفحات -
تاریخ انتشار 1979