TY - GEN
T1 - Multi-processor architectural support for protecting virtual machine privacy in untrusted cloud environment
AU - Wen, Yuanfeng
AU - Lee, Jong Hyuk
AU - Liu, Ziyi
AU - Zheng, Qingji
AU - Shi, Weidong
AU - Xu, Shouhuai
AU - Suh, Taeweon
PY - 2013
Y1 - 2013
N2 - Virtualization is fundamental to cloud computing because it allows multiple operating systems to run simultaneously on a physical machine. However, it also brings a range of security/ privacy problems. One particularly challenging and important problem is: how can we protect the Virtual Machines (VMs) from being attacked by Virtual Machine Monitors (VMMs) and/or by the cloud vendors when they are not trusted? In this paper, we propose an architectural solution to the above problem in multi-processor cloud environments. Our key idea is to exploit hardware mechanisms to enforce access control over the shared resources (e.g., memory spaces), while protecting VM memory integrity as well as inter-processor communications and data sharing. We evaluate the solution using full-system emulation and cycle-based architecture models. Experiments based on 20 benchmark applications show that the performance overhead is 1.5%- 10% when access control is enforced, and 9%-19% when VM memory is encrypted.
AB - Virtualization is fundamental to cloud computing because it allows multiple operating systems to run simultaneously on a physical machine. However, it also brings a range of security/ privacy problems. One particularly challenging and important problem is: how can we protect the Virtual Machines (VMs) from being attacked by Virtual Machine Monitors (VMMs) and/or by the cloud vendors when they are not trusted? In this paper, we propose an architectural solution to the above problem in multi-processor cloud environments. Our key idea is to exploit hardware mechanisms to enforce access control over the shared resources (e.g., memory spaces), while protecting VM memory integrity as well as inter-processor communications and data sharing. We evaluate the solution using full-system emulation and cycle-based architecture models. Experiments based on 20 benchmark applications show that the performance overhead is 1.5%- 10% when access control is enforced, and 9%-19% when VM memory is encrypted.
KW - Cloud
KW - Multi-processor architectural support
KW - VM privacy
UR - http://www.scopus.com/inward/record.url?scp=84879547290&partnerID=8YFLogxK
U2 - 10.1145/2482767.2482799
DO - 10.1145/2482767.2482799
M3 - Conference contribution
AN - SCOPUS:84879547290
SN - 9781450320535
T3 - Proceedings of the ACM International Conference on Computing Frontiers, CF 2013
BT - Proceedings of the ACM International Conference on Computing Frontiers, CF 2013
T2 - 2013 ACM International Conference on Computing Frontiers, CF 2013
Y2 - 14 May 2013 through 16 May 2013
ER -