skip to main content
10.1145/1655008.1655019acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Resource management for isolation enhanced cloud services

Published:13 November 2009Publication History

ABSTRACT

The cloud infrastructure provider (CIP) in a cloud computing platform must provide security and isolation guarantees to a service provider (SP), who builds the service(s) for such a platform. We identify last level cache (LLC) sharing as one of the impediments to finer grain isolation required by a service, and advocate two resource management approaches to provide performance and security isolation in the shared cloud infrastructure - cache hierarchy aware core assignment and page coloring based cache partitioning. Experimental results demonstrate that these approaches are effective in isolating cache interference impacts a VM may have on another VM. We also incorporate these approaches in the resource management (RM) framework of our example cloud infrastructure, which enables the deployment of VMs with isolation enhanced SLAs.

References

  1. Amazon elastic compute cloud (ec2). http://aws.amazon.com/ec2/.Google ScholarGoogle Scholar
  2. Microsoft azure services platform. http://www.microsoft.com/azure/default.mspx.Google ScholarGoogle Scholar
  3. Microsoft Live Mesh. www.mesh.com.Google ScholarGoogle Scholar
  4. Microsoft solver foundation. http://code.msdn.microsoft.com/solverfoundation.Google ScholarGoogle Scholar
  5. Virtualization with Hyper-V. http://www.microsoft.com/windowsserver2008/en/us/hypervmain.aspx.Google ScholarGoogle Scholar
  6. D. J. Bernstein. Cache-timing attacks on AES. http://cr.yp.to/antiforgery/cachetiming-20050414.pdf.Google ScholarGoogle Scholar
  7. D. Chandra, F. Guo, S. Kim, and Y. Solihin. Predicting inter-thread cache contention on a chip multi-processor architecture. In HPCA '05: Proceedings of the 11th International Symposium on High-Performance Computer Architecture, pages 340--351, Washington, DC, USA, 2005. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Fedorova and M. Seltzer.Improving performance isolation on chip multiprocessors via an operating system scheduler.In Parallel Architecture and Compilation Techniques, 2007. PACT 2007. 16th International Conference on, pages 25--38, Sept. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Kim, D. Chandra, and Y. Solihin. Fair cache sharing and partitioning in a chip multiprocessor architecture. In PACT '04: Proceedings of the 13th International Conference on Parallel Architectures and Compilation Techniques, pages 111--122, Washington, DC, USA, 2004.IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Monahan and M. Yearworth. Meaningful security slas. Technical report, HP Labs, 2008.Google ScholarGoogle Scholar
  11. T. Moscibroda and O. Mutlu. Memory performance attacks: denial of memory service in multi-core systems. In SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 1--18, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. G. Murray, G. Milos, and S. Hand. Improving xen security through disaggregation. In VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 151--160, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. A. Osvik, A. Shamir, and E. Tromer. Cache attacks and countermeasures: the case of aes. In Topics in Cryptology - CT-RSA 2006, The CryptographersŠ Track at the RSA Conference 2006, pages 1--20. Springer-Verlag, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Percival. Cache missing for fun and profit. http://www.daemonology.net/papers/htt.pdf.Google ScholarGoogle Scholar
  15. D. Tam, R. Azimi, L. Soares, and M. Stumm. Managing shared l2 caches on multicore systems in software. In Workshop on the Interaction between Operating Systems and Computer Architecture, 2007.Google ScholarGoogle Scholar
  16. Z. W ang and R. B. Lee. New cache designs for thwarting software cache-based side channel attacks. In ISCA '07: Proceedings of the 34th annual international symposium on Computer architecture, pages 494--505, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Resource management for isolation enhanced cloud services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCSW '09: Proceedings of the 2009 ACM workshop on Cloud computing security
      November 2009
      144 pages
      ISBN:9781605587844
      DOI:10.1145/1655008
      • Program Chairs:
      • Radu Sion,
      • Dawn Song

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 13 November 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate37of108submissions,34%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader