Security-aware Real-time Scheduling for Hypervisors

被引:2
作者
Kashyap, Rekha [1 ]
Vidyarthi, D. P. [2 ]
机构
[1] Lal Bahadur Shastri Inst Management, Dept Informat Technol, Delhi, India
[2] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, Delhi, India
来源
2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) | 2014年
关键词
Xen Hypervisor; Real-time Scheduling; Security-aware Scheduling; Virtualization;
D O I
10.1109/CSE.2014.282
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Virtualization is critical to cloud computing because it simplifies the delivery of services by providing a platform for optimizing complex IT resources in a scalable manner. Virtualization architecture provides this illusion through hypervisors/Virtual Machine Monitor, which maps the physical resource to Virtual machines. Security is very essential for cloud users as they relinquish physical possession of their computation and data, which inevitably poses new security risks towards the confidentiality and integrity of the data. Lot of research is initiated in resource provisioning for hypervisors, but still many problems need to be addressed specially for security-aware and real time tasks. A dual objective scheduling algorithm, Real Time Security Maximization (RT-Smax), which aims to meet the deadline of the Virtual machines with best possible security is being proposed. Though this algorithm can be used by any hypervisor, for the current work it has been implemented on Xen VMM. Finally its effectiveness is validated by comparing it with Xen's credit scheduler on security demanding tasks having stringent deadline constraints.
引用
收藏
页码:1520 / 1527
页数:8
相关论文
共 24 条
[1]  
[Anonymous], 2009, TECH REP
[2]  
Barham P., 2003, ACM SOSP
[3]  
Buyya R, FUTURE GENERATION CO
[4]  
Buyya R, 2008, 2008 10 IEEE INT C H, P513
[5]  
Casanova H., 2000, Proceedings 9th Heterogeneous Computing Workshop (HCW 2000) (Cat. No.PR00556), P349, DOI 10.1109/HCW.2000.843757
[6]  
Chisnall David., 2008, DEFINITIVE GUIDE XEN
[7]  
Clark Bryan., 2004, ATEC 04, P47
[8]  
Govindan S, 2007, VEE'07: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON VIRTUAL EXECUTION ENVIRONMENTS, P126
[9]  
Lee M, 2010, ACM SIGPLAN NOTICES, V45, P97
[10]  
Liao Guangdeng., 2008, "Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking and Communications Systems," ANCS '08, P161, DOI DOI 10.1145/1477942.1477971