Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2010, Vol. 4 Issue (1) : 47-64    https://doi.org/10.1007/s11704-009-0076-5
Research articles
TRainbow: a new trusted virtual machine based platform
Yuzhong SUN1,Ying SONG1,Yunwei GAO1,Haifeng FANG2,Kai ZHANG2,Hongyong ZANG2,Yaqiong LI2,Yajun YANG2,Ran AO2,Yongbing HUANG2,Lei DU3,
1.Key Laboratory of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China; 2.Key Laboratory of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China;Graduate University of Chinese Academy of Sciences, Beijing 100190, China; 3.Department of Computer Science and Technology, Xi’an Jiaotong University, Xi’an 710049, China;
 Download: PDF(781 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing platform, as well as the service efficiency on such computing platform. At the same time, according to our knowledge, the design theory of the trusted virtual computing environment and its core system software for such network-based computing platform is at the exploratory stage. In this paper, we believe that efficiency and isolation are the two key proprieties of the trusted virtual computing environment. To guarantee these two proprieties, based on the design principle of splitting, customizing, reconstructing, and isolation-based enhancing to the platform, we introduce TRainbow, a novel trusted virtual computing platform developing by our research group. With the two creative mechanisms, that is, capacity flowing amongst VMs and VM-based kernel reconstructing, TRainbow provides great improvements (up to 42%) in service performance and isolated reliable computing environment for Internet-oriented, large-scale, concurrent services.
Keywords computing platform      virtual machine      capacity service computing      trust chain      isolation      
Issue Date: 05 March 2010
 Cite this article:   
Yuzhong SUN,Ying SONG,Yunwei GAO, et al. TRainbow: a new trusted virtual machine based platform[J]. Front. Comput. Sci., 2010, 4(1): 47-64.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-009-0076-5
https://academic.hep.com.cn/fcs/EN/Y2010/V4/I1/47
Smith J, Nair R. Virtual Machine: versatileplatform for systems and processes. MorganKaufmann,2005,11―12
Song Y, Wang H, Li Y Q, Feng B Q, Sun Y Z. Multi-Tiered On-Demand Resource Schedulingfor VM-Based Data Center. In: Proceedingsof the 9th IEEE/ACM International Symposium on Cluster Computing andthe Grid (CCGrid), 2009: 148―155
Armbrust M, Fox A, Griffith R, et al. Above the Clouds: A Berkeley View of Cloud. Technical Report No. UCB/EECS-2009-28, 2009
www.linux-magazine.com/Online/News/Richard-Stallman-Cloud-Computing-a-Trap
Wood T, Shenoy P, Gerber A, et al. The case for enterprise-ready virtual privateclouds. In: Workshop on Hot Topics in CloudComputing (HotCloud), 2009, San Diego, CA.
www.grid.org.il/Uploads/dbsAttachedFiles/IDC_Cloud_Computing_IGT_final.ppt
www.linuxvirtualserver.org/
Lagar-Cavilla H A, Whitney J, Scannell A, et al. Impromptu Clusters for Near-Interactive Cloud-BasedServices. Technical Report CSRG-TR578,Department of Computer Science, University of Toronto, 2008
Lutterkort D, McLoughlin M. Manageable virtual appliances. In: Proceedings of Linux Symposium2007, Ottawa, Canada, 293―302
Kumar s, Schwan k. Netchannel: a VMM-level mechanismfor continuous, transparentdevice access during VM migration. In: Proceedings of the 4th ACM SIGPLAN/SIGOPS internationalconference on Virtual execution environments (VEE), 2008, Seattle, WA, USA, 31―40
Barham P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization. In: Proceedings of the 19th ACM Symp. on OperatingSystems Principles (SOSP). 2003, 164―177
Nickolai R C, Chandra R, Zeldovich N, et al. The collective: a cache-based system managementarchitecture. In: Proceedings of the 2ndconference on Symposium on Networked Systems Design and Implementation(NSDI), 2005, 2: 259―272
Berger S, Cáceres R, Goldman K A, et al. vTPM: Virtualizing the Trusted Platform Module. In: Proceedings of the 15th conference on USENIXSecurity Symposium, 2006, 15(21): 305―320
Sailer R, Valdez E, Jaeger T, et al. sHype: Secure Hypervisor Approach to TrustedVirtualized Systems. Techn. Rep. RC23511, Feb.2005. IBM Research Division
Song Y, Li Y Q, Wang H, et al. A service-oriented priority-Based resource schedulingscheme for virtualized utility computing. In: Proceedings of the International Conference on High Performance Computing(HiPC), 2008, LNCS5374, 220―231
Garfinkel T, Rosenblum M. When virtual is harder thanreal: security challenges in virtual machine based computing environments. In: Proceedings of the 10th conference on Hot Topicsin Operating Systems (HotOS)2005, 133―138
Engler R D, Kaashoek F M, Jr J. Exokernel: an operating system architecture for application-levelresource management. ACM SIGOPS OperatingSystems Review, 1995, 29(5): 251―266
Buyya R, Cortes T, Jin H. Single system image (SSI). The International Journal of High Performance Computing Applications, 2001, 15(2): 124―135
Walker B, Steel D. Implementing a full singlesystem image UnixWare cluster: Middleware vs. underware. In: Proceedings of the International Conferenceon Parallel and Distributed Processing Techniques and Applications(PDPTA), Las Vegas, NV, 1999, 2767―2773
Renaud L, Pascal G, Geoffroy V, Christine M. Openmosix,OpenSSI and kerrighed: a comparative study. In: IEEE International Symp. on Cluster Computing. and the Grid (CCGrid),Cardiff, UK, 2005,1016―1023
Wood T, Tarasuk-Levin G, Shenoy P, et al. Memory Buddies: Exploiting Page Sharing forSmart Colocation in Virtualized Data Centers. In: Proceedings of the 4th ACM SIGPLAN/SIGOPS international conferenceon Virtual execution environments (VEE), 2009, 31―40
Tanenbaum A, Herder J, Bos H. Can we make operating systems reliable and secure? IEEE Computer, 2006, 39(5): 44―51
Karger P A, Safford D R. I/O for virtual machine monitors:security and performance issues. IEEE Securityand Privacy, 2008, 6(5): 16―23
Wei J P, Jackson J, Wiegert J. Towards scalable and high performance I/O virtualization –a case study. Lecture Notes in ComputerScience (LNCS)2007, 4782: 586―598
Trusted Computing Group. TPM main specification, main specification version 1.2 revision 94, 2006
AMD. Secure VirtualMachine Architecture Reference Manual, May2005
Sailer R, Zhang X L, Jaeger T, et al. Design and implementation of a TCG-based integritymeasurement architecture. In: Proceedingsof the 13th conference on USENIX Security Symposium, 2004, 223―238
Dean J, Ghemawat S. MapReduce: Simplified dataprocessing on large clusters. In: Proceedingsof the 6th Symp. on Operating System Design and Implementation (OSDI). Berkeley: USENIX Association, 2004, 137―150
www.websiteoptimization.com/speed/tw-eak/average-web-page/
Zang H Y, Gu K Y, Li Y Q, et al. A highly efficient inter-domain communicationchannel. In: IEEE 9th International Conferenceon Computer and Information Technology (CIT). 2009, 369―374
Wang J, Wright K L, Gopalan K. XenLoop: a transparent high performance Inter-VM networkloopback. In: Proceedings of InternationalSymposium on High Performance Distributed Computing (HPDC), 2008, 109―118
[1] Ningnan ZHOU, Xiao ZHANG, Shan WANG. Timestamp reassignment: taming transaction abort for serializable snapshot isolation[J]. Front. Comput. Sci., 2019, 13(6): 1282-1295.
[2] Shukun LIU, Weijia JIA, Xianmin PAN. Fault-tolerant feedback virtual machine deployment based on user-personalized requirements[J]. Front. Comput. Sci., 2018, 12(4): 682-693.
[3] Xiong FU, Juzhou CHEN, Song DENG, Junchang WANG, Lin ZHANG. Layered virtual machine migration algorithm for network resource balancing in cloud computing[J]. Front. Comput. Sci., 2018, 12(1): 75-85.
[4] Zhaoning ZHANG,Dongsheng LI,Kui WU. Large-scale virtual machines provisioning in clouds:challenges and approaches[J]. Front. Comput. Sci., 2016, 10(1): 2-18.
[5] Yuehua DAI, Yi SHI, Yong QI, Jianbao REN, Peijian WANG. Design and verification of a lightweight reliable virtual machine monitor for a many-core architecture[J]. Front Comput Sci, 2013, 7(1): 34-43.
[6] Xiaolin WANG, Xiang WEN, Yechen LI, Zhenlin WANG, Yingwei LUO, Xiaoming LI. Dynamic cache partitioning based on hot page migration[J]. Front Comput Sci, 2012, 6(4): 363-372.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed