Remote Memory Swapping for Virtual Machines in Commercial Infrastructure-as-a-Service

Author(s):  
Kashifuddin Qazi ◽  
Steven Romero
2014 ◽  
Vol 513-517 ◽  
pp. 1268-1273
Author(s):  
R. Raghavendran ◽  
B. Ragupathi

A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permissions to customers eases the installation and use of user software, but it may lead to security issues. The providers usually delegate the task of keeping virtual machines up to date to the customers, while the customers expect the providers to perform this task. Consequently, a large number of virtual machines (either running or dormant) are not patched against the latest software vulnerabilities. The approach presented in this article deals with these problems by helping users as well as providers to keep virtual machines up to date. Prior to the update step, it is crucial to know which software is actually outdated or affected by remote security vulnerabilities. While these tasks seem to be straight forward, developing a solution that handles multiple software repositories from different vendors and identifies the correct packages is a challenging task. The Update Checker presented in this article identifies outdated software packages in virtual machines, regardless if the virtual machine is running or dormant on disk. The proposed Online Penetration Suite performs pre-rollout scans of virtual machines for security vulnerabilities using established techniques and prevents execution of flawed virtual machines.


2022 ◽  
Vol 22 (1) ◽  
pp. 1-26
Author(s):  
Zakaria Benomar ◽  
Francesco Longo ◽  
Giovanni Merlino ◽  
Antonio Puliafito

In Cloud computing deployments, specifically in the Infrastructure-as-a-Service (IaaS) model, networking is one of the core enabling facilities provided for the users. The IaaS approach ensures significant flexibility and manageability, since the networking resources and topologies are entirely under users’ control. In this context, considerable efforts have been devoted to promoting the Cloud paradigm as a suitable solution for managing IoT environments. Deep and genuine integration between the two ecosystems, Cloud and IoT, may only be attainable at the IaaS level. In light of extending the IoT domain capabilities’ with Cloud-based mechanisms akin to the IaaS Cloud model, network virtualization is a fundamental enabler of infrastructure-oriented IoT deployments. Indeed, an IoT deployment without networking resilience and adaptability makes it unsuitable to meet user-level demands and services’ requirements. Such a limitation makes the IoT-based services adopted in very specific and statically defined scenarios, thus leading to limited plurality and diversity of use cases. This article presents a Cloud-based approach for network virtualization in an IoT context using the de-facto standard IaaS middleware, OpenStack, and its networking subsystem, Neutron. OpenStack is being extended to enable the instantiation of virtual/overlay networks between Cloud-based instances (e.g., virtual machines, containers, and bare metal servers) and/or geographically distributed IoT nodes deployed at the network edge.


2021 ◽  
Vol 5 (4) ◽  
pp. 52
Author(s):  
Huseyn Huseynov ◽  
Tarek Saadawi ◽  
Kenichi Kourai

The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual life. One of the emerging technologies that enables the evolution to 5G by bringing cloud capabilities near to the end users is Edge Computing or also known as Multi-Access Edge Computing (MEC) that will become pertinent towards the evolution of 5G. This evolution also entails growth in the threat landscape and increase privacy in concerns at different application areas, hence security and privacy plays a central role in the evolution towards 5G. Since MEC application instantiated in the virtualized infrastructure, in this paper we present a distributed application that aims to constantly introspect multiple virtual machines (VMs) in order to detect malicious activities based on their anomalous behavior. Once suspicious processes detected, our IDS in real-time notifies system administrator about the potential threat. Developed software is able to detect keyloggers, rootkits, trojans, process hiding and other intrusion artifacts via agent-less operation, by operating remotely or directly from the host machine. Remote memory introspection means no software to install, no notice to malware to evacuate or destroy data. Experimental results of remote VMI on more than 50 different malicious code demonstrate average anomaly detection rate close to 97%. We have established wide testbed environment connecting networks of two universities Kyushu Institute of Technology and The City College of New York through secure GRE tunnel. Conducted experiments on this testbed deliver high response time of the proposed system.


Author(s):  
Dang Minh Quan

Cloud computing has become more and more popular  with  the  widely  deployment  of  several  cloud infrastructures.  Infrastructure-as-a-service  (IaaS) Cloud  computing  replaces  bare  computer hardware. The cloud user  will use the virtual  machines (VMs)  to  fullfil  their  computing  requirements.  Among the  components  of  IaaS  cloud  software  stack,  the resource  allocation  module  is  very  important  as  it selects suitable VMs and the place to execute VMs. This paper  focuses  on  studying  and  classifying  algorithms used  in  the  resource  allocation  module.  The  issues  of how to apply those algorithms are also discussed.


2017 ◽  
Vol 5 (4) ◽  
pp. 142
Author(s):  
Joan Ricard Panggabean ◽  
Agung Budi Prasetijo ◽  
Eko Didik Widianto

The growth of high-quality computing needs triggers the development of infrastructure that requires huge costs and resources. This research applied OpenStack in Metal as a Service (MaaS) environment to provide multitenant infrastructure services in the form of virtual machines (IaaS). The capacity of this IaaS system can be configured based on the needs of the computing resources (CPUs, memory, storage, and network interfaces). Users within the tenant can request infrastructure services as their needs without requiring human interaction with each service provider.Meningkatnya kebutuhan komputasi berkualitas tinggi mendorong pengembangan infrastruktur server yang membutuhkan biaya dan sumber daya besar. Penelitian ini mengaplikasikan OpenStack dalam lingkungan Metal as a Service (MaaS) untuk menyediakan layanan infrastruktur multitenant berupa mesin-mesin virtual sebagai Infrastructure as a Service (IaaS). Kapasitas sistem layanan IaaS ini dapat dikonfigurasi berdasarkan kebutuhan sumber daya komputasi (CPU, memori, ruang penyimpan, dan antarmuka jaringan). Pengguna dalam tenant dapat meminta layanan infrastruktur secara mandiri dengan kapasitas komputasi sesuai yang dibutuhkan.


2020 ◽  
Vol 9 (4) ◽  
pp. 1558-1568
Author(s):  
Surapong Wiriya ◽  
Winai Wongthai ◽  
Thanathorn Phoka

We introduce the novel technical results of the enhanced logging system for customer virtual machines (VMs) in an Infrastructure as a Service (IaaS) cloud. The main contribution is that the enhanced system can work with a better system's accuracy and speed, with the simplicity of the design and implementation. We measure the accuracy of the unenhanced logging system, then find a quick solution to enhance the system based on the results of the measurement. To measure and enhance the unenhanced system, we increase the main memory and CPU cores of the VMs then collect the accuracy results from each increment configuration. We analyze the results and propose to use the taskset tool to enhance the accuracy of the system. Found three main findings include: firstly, the accuracy of the enhanced system is about 20% on maximum better than the unenhanced one;  the enhanced system accuracy becomes 100%; lastly, the enhanced system can detect a file with the smaller file size as almost 12% smaller. The findings can be a basis to design the logging systems in an IaaS cloud, to decrease hardware and energy investment. To the best of our knowledge, the contribution and findings are not in the literature.


2014 ◽  
Vol 5 (1) ◽  
pp. 24-43 ◽  
Author(s):  
T.R.V. Anandharajan ◽  
M.A. Bhagyaveni

Infrastructure as a Service is an important component in the cloud building block. The authors present a Cloud Simulation experience with an objective to handle the performance and energy tradeoff in an Infrastructure as a Service (IaaS) environment. The authors present the orchestration of statistical, machine learning and energy model based Minimum Power Performance (MPP) algorithm to validate simulation using PlanetLab VMs real world traces from real systems. Their proposed algorithm consolidates virtual machines (VMs) in the Processing Elements (PE or Host or Server) and is 39% better than the legacy algorithms.


Author(s):  
Edy Kristianto

The Internet of Things (IOT) becomes the purpose of the development of information and communication technology. Cloud computing has a very important role in supporting the IOT, because cloud computing allows to provide services in the form of infrastructure (IaaS), platform (PaaS), and Software (SaaS) for its users. One of the fundamental services is infrastructure as a service (IaaS). This study analyzed the requirement that there must be based on a framework of NIST to realize infrastructure as a service in the form of a virtual machine to be built in a cloud computing environment.


Sign in / Sign up

Export Citation Format

Share Document