Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints - Archive ouverte HAL Access content directly
Conference Papers Year : 2014

Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints

(1, 2) , (3, 1, 4)
1
2
3
4

Abstract

Nowadays virtualization is used as the sole mechanism to isolate different users on Cloud platforms. We will show that due to improper virtualization of micro-architectural components, data leak and modification can occur on public Clouds. Furthermore, using the same vector, it is possible to induce performance interferences, i.e. noisy neighbors. Using this approach, a VM can slow down and steal resources from concurrent VMs. We propose placement heuristics that take into account isolation requirements. We modify three classical heuristics to take into account these requirements. Furthermore, we propose four new heuristics that take into account the hierarchy of the Cloud platforms and the isolation requirements. Finally, we evaluate these heuristics and compare them with the modified classical ones. We show that our heuristics are performing at least as good as classical ones but are scaling better and are faster by a few order of magnitude than the classical ones.
Fichier principal
Vignette du fichier
IPDPS14_userisolation.pdf (205.78 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01240592 , version 1 (09-12-2015)

Licence

Attribution - NonCommercial - NoDerivatives - CC BY 4.0

Identifiers

Cite

Eddy Caron, Jonathan Rouzaud-Cornabas. Improving Users' Isolation in IaaS: Virtual Machine Placement with Security Constraints. 7th IEEE International Conference on Cloud Computing (IEEE Cloud 2014), Jun 2014, Anchorage, United States. pp.8, ⟨10.1109/CLOUD.2014.19⟩. ⟨hal-01240592⟩
994 View
280 Download

Altmetric

Share

Gmail Facebook Twitter LinkedIn More