1 / 9

Virtualization: An Overview

Virtualization: An Overview . Brendan Lynch. Forms of virtualization . In all cases virtualization is taking a physical component and simulating the interface through multiplexing, aggregation, and/or emulation. VMs can exist at the application level as well as the hardware level.

aricin
Download Presentation

Virtualization: An Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Virtualization:An Overview Brendan Lynch

  2. Forms of virtualization • In all cases virtualization is taking a physical component and simulating the interface through multiplexing, aggregation, and/or emulation. • VMs can exist at the application level as well as the hardware level. • Process VMs, System VMs and simply virtualized resources.

  3. System VMs • Critical aspect of cloud computing and utility computing in general. • Pooling resources for higher utilization is a requirement of utility computing. • In a cloud this allows higher elasticity and system security

  4. Virtual Machine Monitor - VMM • A thin middleware that manages virtual machines. • The VMM facilitates all operations between the host and guest system. • The guest system is an OS; the host system can be another OS or actual hardware or virtualized hardware.

  5. VMM - continued • Guest Operating systems run all OS operations through the virtual hardware. • These calls are ‘trapped’ by the VMM and run on the host system. This layer of abstraction can greatly increase security. • In the case of a host OS all the VMM does is scan these instructions and send them to the host OS for scheduling. • Hardware VMMs must provide all scheduling, I/O ect.

  6. VMM - continued • This extra layer between the host/guest incurs additional overhead. • This cost is in addition to the hardware being simulated. • Benefits include: exclusive access to declared resources, system isolation for security, easy scalability for deployment, and performance monitoring optimizations.

  7. Security Risk • The biggest concerns associated to off-site storage are the ones we can not control: • Physical security of components • What is the level of security of the overall system? • Am I running on the hardware? • Is the host OS secure?

  8. Security Risk cont. • VMM based threats: • Starvation: Is my VM being context swapped, what does this do too performance. • Malicious VMs can attempt to bypass resource limits • VM side-channel attacks • VM maliciously/non-maliciously flooded from other VM communications • As mentioned earlier vulnerabilities could exist at a lower level. The VM is helpless to these attacks.

  9. Conclusions • Virtual machines and VMMs are a requirement of utility computing. • Trust must exist in the hardware/host OS owner that the system is kept secure. • Virtual machines allow high levels of hardware utilization and provide portability. • HLL level portability and OS image level portability.

More Related