Skip to main content

Probing the Scheduling Algorithms in the Cloud Based on OpenStack

  • Conference paper
  • First Online:
Book cover Cloud Computing and Security (ICCCS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9483))

Included in the following conference series:

Abstract

Among modern cloud infrastructures, live migration of virtual machines offers many advantages like scalability and elasticity but also leads to risks in the meantime. Security issues of live migration have been studied and classified into three threats: control plane, data plane and migration module. Lots of work has focused on the latter two aspects. However, the security of control plane has yet to be analyzed. This paper starts by introducing three classes of control plane threats: load balancing, scheduling and transmission. We then elaborate how scheduling attack can subvert the VM scheduling algorithm via the proposed scheduling algorithm reverse approach (SARA). We evaluate the effects of SARA using datasets gathered from OpenStack. This work is a beneficial attempt to compromise the control plane of VM migration, which can be used as a self-test tool for cloud service providers to test the defences against network intruders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Warfield, A.: Live migration of virtual machines. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, vol. 2, pp. 273–286. USENIX Association (2005)

    Google Scholar 

  2. Forsman, M., Glad, A., Lundberg, L., Ilie, D.: Algorithms for automated live migration of virtual machines. J. Syst. Softw. 101, 110–126 (2015)

    Article  Google Scholar 

  3. Meneses, E., Ni, X., Zheng, G., Mendes, C.L., Kale, L.V.: Using migratable objects to enhance fault tolerance schemes in supercomputers. IEEE Trans. Parallel Distrib. Syst. 26(7), 2061–2074 (2014)

    Article  Google Scholar 

  4. Yang, C.T., Liu, J.C., Hsu, C.H., Chou, W.L.: On improvement of cloud virtual machine availability with virtualization fault tolerance mechanism. J. Supercomputing 69(3), 1103–1122 (2014)

    Article  Google Scholar 

  5. Oberheide, J., Cooke, E., Jahanian, F.: Empirical exploitation of live virtual machine migration. In: Proceedings of BlackHat DC Convention 2008

    Google Scholar 

  6. Ver, M.: Dynamic load balancing based on live migration of virtual machines: security threats and effects. Rochester Institute of Technology (2011)

    Google Scholar 

  7. Perez-Botero, D.: A Brief Tutorial on Live Virtual Machine Migration From a Security Perspective. University of Princeton, USA (2011)

    Google Scholar 

  8. Duncan, A., Creese, S., Goldsmith, M., Quinton, J.S.: Cloud computing: insider attacks on virtual machines during migration. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 493–500. IEEE (2013)

    Google Scholar 

  9. Perez, R., Sailer, R., van Doorn, L.: vTPM: virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium, pp. 305–320 (2006)

    Google Scholar 

  10. Zhang, F., Huang, Y., Wang, H., Chen, H., Zang, B.: PALM: security preserving VM live migration for systems with VMM-enforced protection. In: Third Asia-Pacific Trusted Infrastructure Technologies Conference, APTC 2008, pp. 9–18. IEEE (2008)

    Google Scholar 

  11. Masti, R.J.: On the security of virtual machine migration and related topics. Master Thesis, Eidgenossische Technische Hochschule Zurich (2010)

    Google Scholar 

  12. Aslam, M., Gehrmann, C., Bjorkman, M.: Security and trust preserving VM migrations in public clouds. In: 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 869–876. IEEE (2012)

    Google Scholar 

  13. Wang, Z., Jiang, X.: Hypersafe: a lightweight approach to provide lifetime hypervisor control-flow integrity. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 380–395. IEEE (2010)

    Google Scholar 

  14. Scheduling - OpenStack Configuration Reference - juno. http://docs.openstack.org/juno/config-reference/content/section_compute-scheduler.html

  15. Hines, M.R., Deshpande, U., Gopalan, K.: Post-copy live migration of virtual machines. ACM SIGOPS Oper. Syst. Rev. 43(3), 14–26 (2009)

    Article  Google Scholar 

  16. Zhang, Y., Juels, A., Reiter, M.K., Ristenpart, T.: Cross-VM side channels and their use to extract private keys. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 305–316. ACM (2012)

    Google Scholar 

  17. Vinoski, S.: Advanced message queuing protocol. IEEE Internet Comput. 6, 87–89 (2006)

    Article  Google Scholar 

  18. Baxter, J.H.: Wireshark Essentials. Packt Publishing Ltd, UK (2014)

    Google Scholar 

  19. Anderson, E., Bai, Z., Bischof, C., Blackford, S., Demmel, J., Dongarra, J., Sorensen, D.: LAPACK Users’ Guide, vol. 9. SIAM, Philadelphia (1999)

    Book  Google Scholar 

  20. Sanderson, C.: Armadillo: an open source C++ linear algebra library for fast prototyping and computationally intensive experiments (2010)

    Google Scholar 

Download references

Acknowledgments

We thank the reviewers for their help improving this paper. This work is supported by the National High Technology Research and Development Program (“863” Program) of China under Grant No. 2015AA016009, the National Natural Science Foundation of China under Grant No. 61232005, and the Science and Technology Program of Shen Zhen, China under Grant No. JSGG20140516162852628.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Luo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Luo, Y., Shen, Q., Li, C., Chen, K., Wu, Z. (2015). Probing the Scheduling Algorithms in the Cloud Based on OpenStack. In: Huang, Z., Sun, X., Luo, J., Wang, J. (eds) Cloud Computing and Security. ICCCS 2015. Lecture Notes in Computer Science(), vol 9483. Springer, Cham. https://doi.org/10.1007/978-3-319-27051-7_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27051-7_44

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27050-0

  • Online ISBN: 978-3-319-27051-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics