Virtual Machine Extrospection: a Reverse Information Retrieval in Clouds

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Machine Extrospection: a Reverse Information Retrieval in Clouds © 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162) Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds 1.KOVVURI KAVITHA 2. CHIRAPARAPU SRINIVASA RAO PG Scholar, Department of Computer Science, Associate Professor in Computer Science, SVKP & Dr K S Raju Arts & Science College, Penugonda, SVKP & Dr K S Raju Arts & Science College, Penugonda, A.P, India. W.G.Dt,A.P, India. Abstract:In a virtualized situation, it isn't hard to Index terms: Virtualization, Hypervisor, recover visitor OS data from its hypervisor. Be Extrospection, Linux, KVM. that as it may, it is trying to recover data in the turnaround heading, i.e., recover the hypervisor 1. Introduction: AS virtualization innovation data from inside a visitor OS, which remains an turns out to be progressively common, an open issue and has not yet been thoroughly assortment of security approacheshas been considered previously. In this paper, we step up produced at the hypervisor level, including and think about this switch data recovery issue. interruption and malware location, honeypots, Specifically, we examine how to decide the host portion rootkit protection, and recognition of OS portion form from inside a visitor OS. We see secretly executing pairs. These security that cutting-edge product hypervisors present new administrations rely upon the key factor that the highlights and bug settles in pretty much every hypervisor is separated from its visitor OSes. As new discharge. Consequently, via cautiously the hypervisor keeps running at a more examining the seven-year advancement of Linux advantaged dimension than its visitor OSes, at this KVM improvement (counting 3485 patches), we dimension, one can control physical assets, screen can recognize 19 highlights and 20 bugs in the their entrance, and be disconnected from altering hypervisor perceivable from inside a visitor OS. against aggressors from the visitor OS. Checking Expanding on our location of these highlights and of fine-grained data of the visitor OSes from the bugs, we present a novel structure called basic hypervisor is called virtual machine Hyperprobe that out of the blue empowers clients thoughtfulness (VMI) [1]. Be that as it may, at the in a visitor OS to naturally identify the basic host visitor OS level recovering data about the basic OS portion form shortly. We actualize a model of hypervisor turns out to be testing, if certainly Hyperprobe and assess its adequacy in six feasible. In this paper, we mark the switch data certifiable mists, including Google Compute recovery with the authored term virtual machine Engine (a.k.a. Google Cloud), HP Helion Public extrospection (VME). While VMI has been Cloud, ElasticHosts, Joyent Cloud, CloudSigma, broadly utilized for security purposes amid the and VULTR, just as in a controlled testbed previous decade, the invert course VME the condition, all yielding promising outcomes. strategy that recovers the hypervisor data from the JETIR1903027 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 171 © 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162) visitor OS level is another subject and has not will enable clients to decide if the fundamental been completely examined previously. VME can equipment/programming can be trusted, and be basically vital for both noxious assailants and accordingly help them choose whether or not to customary clients. On one hand, from the utilize this cloud administration. In any case, for assailants' point of view, when an aggressor is security reasons, cloud suppliers normally don't responsible for a virtual machine (VM), either as a discharge such delicate data to people in general lawful inhabitant or after an effective trade off of or clients. While investigate endeavors have been the injured individual's VM, the fundamental made to identify the presence of a hypervisor, hypervisor turns into its assaulting target. This from a visitor OS, to the best of our insight, there risk has been shown in, where an assailant can is no writing portraying how to recover mount a benefit acceleration assault from inside a increasingly point by point data about the VMware virtual machine and a KVM-based hypervisor, e.g., the part form of the host OS, the virtual machine, individually, and afterward circulation of the host OS, the CPU type, the increases some control of the host machine. In memory type, or any equipment data. In this spite of the fact that these works show the paper, we make an endeavor to examine this likelihood of such a risk, effective break assaults issue. All the more explicitly, as an initial move from the visitor to the host are uncommon. The towards VME, we consider the issue of essential reason is that most hypervisors are, by recognizing/construing the host OS part form structure, undetectable to the VMs. Thusly, from inside a visitor OS, and we expect our work regardless of whether an assailant increases full will motivate more consideration on mining the control of a VM, a fruitful endeavor to break out data of a hypervisor. The significant research of the VM and break into the hypervisor requires commitments of our work are condensed as a top to bottom learning of the hidden hypervisor, pursues: e.g., type and form of the hypervisor. Be that as it • We are the first to consider the issue of may, there is no clear route for aggressors to distinguish ing/construing the host OS portion acquire such learning. Then again, considerate adaptation from inside a VM. Investigating the cloud clients may likewise need to know the development of Linux KVM hypervisors, we hidden hypervisor data. It is ordinarily realized break down different highlights and bugs that equipment and programming frameworks presented in the KVM hypervisor; and after that both have different bugs and vulnerabilities, and we clarify how these highlights and bugs can be diverse equipment/programming may display utilized to distinguish/construe the hypervisor distinctive vulnerabilities. Cloud clients, when portion form. settling on choices on the decision of a cloud • We structure and actualize a novel, reasonable, supplier, might need to know more data about the programmed, and extensible system, called fundamental equipment or programming. This Hyperprobe, for leading the switch data recovery. JETIR1903027 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 172 © 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162) Hyperprobe can help clients in a VM to for recognizing the basic hypervisors and are consequently recognize/deduce the fundamental quickly portrayed as pursues. RedPill and Scooby host OS portion form in under five minutes with Doo are two systems proposed to distinguish high exactness. VMware, and they both work on the grounds that • We play out our examinations in six genuine VMware migrates some touchy information mists, including Google Compute Engine, HP structures, for example, Interfere with Descriptor Helion Public Cloud, ElasticHosts, Joyent Cloud, Table (IDT), Global Descriptor Table (GDT), and CloudSigma, and VULTR, and our exploratory Local Descriptor Table (LDT). Along these lines, outcomes are promising. To additionally approve one can inspect the estimation of the IDT base, in the exactness of Hyperprobe, we perform explores the event that it surpasses a specific esteem or in a controlled testbed condition. For 11 of the 35- equivalents a particular hard-coded esteem, at that bit adaptations we examined, Hyperprobe can point one expects that VMware is being utilized. effectively gather the accurate rendition number; Be that as it may, these two strategies are both for the rest, Hyperprobe can limit it down to restricted to VMware identification and are not inside 2 to 5 forms. dependable on machines with multi-centers. The rest of the paper is composed as pursues. Paradoxically, the identification method proposed Area 2 portrays the foundation of our work. in is increasingly solid yet just chips away at Segment 3 displays the plan of Hyperprobe. Area Windows visitor OSes. Their key perception is 4 subtleties the usage of Hyperprobe with a few that in light of the fact that LDT isn't utilized by contextual investigations. Segment 5 presents Windows, the LDT base would be zero of every exploratory outcomes on virtual machines in the traditional Windows framework yet nonzero in a cloud and our controlled testbed. Segment 6 talks virtual machine condition. Consequently, one can about some potential expansions to the structure. just check for a non-zero LDT base on Windows Area 7 reviews related work, lastly, Section 8 and decide whether it is running in VMware finishes up the paper. condition. An assortment of identification systems 2. Related Work: We study related work in three dependent on timing examination have likewise classifications: location of a particular hypervisor, been proposed in. The fundamental thought is that assaults against hypervisors, and working a few directions (e.g., RDMSR) are caught by framework fingerprinting. hypervisors and thus their execution time is longer Location of Hypervisors: than that on a genuine machine. One can identify Since virtualization has been generally utilized for the presence of a hypervisor by estimating the conveying cautious arrangements, it is basic for time taken to execute these directions. Note that assailants to most likely recognize virtualization, all these past works can just identify the nearness i.e., distinguish the presence of a hypervisor. To of a hypervisor as well as its sort, yet none can this end, a few methodologies have been proposed recover progressively itemized data about the JETIR1903027 Journal of Emerging Technologies and Innovative Research (JETIR) www.jetir.org 173 © 2019 JETIR March 2019, Volume 6, Issue 3 www.jetir.org (ISSN-2349-5162) basic hypervisor, for example, its piece examined. These devices work by looking at the adaptation. TCP/IP traffic designs and coordinating them 3.
Recommended publications
  • Arquitecturas Para La Federación De Proveedores Cloud
    Arquitecturas para la Federación de Proveedores Cloud Daniel Molina Aranda MÁSTER EN INVESTIGACIÓN EN INFORMÁTICA. FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTESNE DE MADRID Trabajo Fin Máster en Ingeniería de Computadores 2010-2011 Director/es y/o colaborador: Rubén Santiago Montero Ignacio Martín Llorente Convocatoria: Septiembre 2011 Calicación: 8 Autorización de difusión Daniel Molina Aranda 2010-2011 El/la abajo rmante, matriculado/a en el Máster en Investigación en Informática de la Facultad de Informática, autoriza a la Universidad Complutense de Madrid (UCM) a difundir y utilizar con nes académicos, no comerciales y mencionando expresamente a su autor el presente Trabajo Fin de Máster: Arquitecturas para la Federación de Proveedores Cloud, realizado durante el curso académico 2010-2011 bajo la dirección de Rubén Santiago Montero e Ignacio Martín Llorente en el Departamento de Arquitectura de Computadores, y a la Biblioteca de la UCM a depositarlo en el Archivo Institucional E-Prints Complutense con el objeto de incrementar la difusión, uso e impacto del trabajo en Internet y garantizar su preservación y acceso a largo plazo. Resumen en castellano Este trabajo analiza el modelo de cloud híbrido, un paradigma que combina los depliegues de cloud privado con los recursos ofrecidos por cloud públicos. Este nuevo modelo no está totalmente desarrollado todavía, y hay que dedicar mucha más investigación y desarrollo antes de conseguir que despliegues multi-cloud puedan ser usados en producción. En este trabajo se realiza un estudio de las limitaciones y desafíos de este modelo y a su vez se plantean algunas de la técnicas más comunes para lidiar con estos puntos.
    [Show full text]
  • TOOLS for CLOUD COMPUTING Eucalyptus, Opennebula and Tashi
    TOOLS FOR CLOUD COMPUTING Eucalyptus, OpenNebula and Tashi Gustavo Ansaldi Oliva [email protected] [email protected] Agenda • Basic Concepts • Eucalyptus • OpenNebula • Tashi • Tools Comparison • Extra: Amazon EC2 API 05/07/2010 Gustavo Ansaldi Oliva 2 Basic Concepts • Virtualization – Hypervisor • A.K.A Virtual Machine Monitor (VMM) • Allows multiple operating systems to run concurrently on a host computer— a feature called hardware virtualization • The hypervisor presents the guest OSs with a virtual platform and monitors the execution of the guest OSs • Type 1/native/baremetal: Xen • Type 2/hosted: VMWare Server, Sun VirtualBox 05/07/2010 Gustavo Ansaldi Oliva 3 Basic Concepts • Virtualization – Hardware-assisted virtualization • Processor instruction set extensions that provide hardware assistance to virtual machines • These extensions address the parts of x86 that are difficult or inefficient to virtualize, providing additional support to the hypervisor. • Enables simpler virtualization code and a higher performance for full virtualization. • Intel VT-x, AMD-V 05/07/2010 Gustavo Ansaldi Oliva 4 Basic Concepts • Virtualization – KVM • Kernel-based Virtual Machine • Full virtualization solution for Linux on x86 hardware • Requires processor with Intel VT or AMD-V • KVM does not perform any emulation by itself. • User-space program uses the /dev/kvm interface to set up the guest VM's address space, feeds it simulated I/O and maps its video display back onto the host's • KVM uses QEMU for its device emulation 05/07/2010 Gustavo Ansaldi
    [Show full text]
  • Lighthouse 5 User Guide
    Lighthouse 5 User Guide Revision 5.3.0.1 2019-04-12 2 Lighthouse 5 User Guide TABLE OF CONTENTS 1. About this User Guide 6 2. Lighthouse overview 7 2.1 Lighthouse VM 5 host requirements 7 2.2 Lighthouse architecture 7 2.2.1 Lighthouse to Node interactions 8 2.2.2 User to Lighthouse interactions 8 2.2.3 Node organization and filtering 9 2.2.4 Multiple Instance Feature 9 3. Lighthouse VM installation 10 3.1 Lighthouse VM components 10 3.2 VMware vSphere 6.0 via the VMware vSphere 6.0 client on Windows 10 3.2.1 Launch the vSphere Client and connect to a vSphere instance. 10 3.2.2 Import the Lighthouse VM Open Volume Format (.ovf) image 11 3.2.3 Launch the Opengear Lighthouse virtual machine 13 3.2.4 Access the console of a running but headless Opengear Lighthouse instance 13 3.3 VMware Workstation Player on Windows as host 14 3.4 VMware Workstation Pro on Windows as host 15 3.5 VMware Workstation Player or Pro on Fedora Workstation as host 15 3.6 Local deployment on Hyper-V running on Windows 10/Windows Server 2016 15 3.7 Remote Hyper-V deployment with pre-authenticated user 16 3.8 Remote Hyper-V deployment with different user 16 3.9 VirtualBox on Windows as host 17 3.10 VirtualBox on macOS as host 18 3.11 VirtualBox on Ubuntu as host 19 3.12 VirtualBox on Fedora Workstation as host 20 3.13 Virtual Machine Manager (KVM) on Ubuntu as host 20 3.14 Boxes on Fedora Workstation as host 21 3.15 Boxes on CentOS as host 21 3.16 Google Compute Engine environment 22 4.
    [Show full text]
  • Cohesiveft Adds Internal Eucalyptus Cloud Deployment Option to Its Elastic Server(R) Platform
    Source: Cohesive Networks April 23, 2009 12:11 ET CohesiveFT Adds Internal Eucalyptus Cloud Deployment Option to Its Elastic Server(R) Platform Custom Elastic Servers Configured, Assembled, and Deployed to Ubuntu Enterprise Cloud CHICAGO, IL--(Marketwire - April 23, 2009) - CohesiveFT (http://www.cohesiveft.com), the leader in onboarding solutions for virtual and cloud computing infrastructures, today announced a technology preview of Elastic Server deployment to Eucalyptus private clouds. Elastic Server Personal Edition users can now dynamically deploy custom servers to a private Eucalyptus cloud infrastructure hosted on their own network. This technology preview comes on the heels of the release of Ubuntu 9.04 Server Edition which includes a technology preview for the new Ubuntu Enterprise Cloud powered by the open-source Eucalyptus system. "The inclusion of the Ubuntu Enterprise Cloud in the Ubuntu 9.04 Server Edition release opens up many opportunities for private cloud computing in the enterprise," said Simon Wardley, Software Services Manager Canonical. "CohesiveFT is well positioned to help organizations leverage this new and exciting technology." With the combined solution from Canonical and CohesiveFT, organizations can build, populate, and evaluate internal Eucalyptus clouds without the latency or security issues associated with public cloud computing. Additionally, Eucalyptus shares API compatibility with Amazon Web Services' EC2, giving organizations interested in migrating to the cloud a suitable, local test environment. Ubuntu 9.04 Server Edition has made Eucalyptus extremely easy to configure and deploy through its integration into Ubuntu Enterprise Cloud. Elastic Server can be used to automatically deploy custom servers to Ubuntu Enterprise Cloud infrastructure quickly and easily.
    [Show full text]
  • Driver LXC Development for Opennebula Desarrollo De Un
    INGENIERÍA INVESTIGACIÓN Y TECNOLOGÍA volumen XIX (número 1), enero-marzo 2018 63-76 ISSN 2594-0732 FI-UNAM artículo arbitrado Información del artículo: recibido: 7 de octubre de 2016, reevaluado: 12 de marzo de 2017, aceptado: 3 de julio de 2017 Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license DOI: http://dx.doi.org/10.22201/fi.25940732e.2018.19n1.006 Driver LXC development for OpenNebula Desarrollo de un driver LXC para OpenNebula García-Perellada Lilia Rosa Rodríguez-De Armas Yalina José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Faculty of Electrical Engineering Telecommunication and Telematics Department Information and Communication Technologies Services Department E-mail: [email protected] E-mail: [email protected] Vega-Gutiérrez Sergio Garófalo-Hernández Alain Abel José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Electrical Engineering Faculty Telecommunication and Telematics Department Telecommunication and Telematics Department E-mail: [email protected] E-mail: [email protected] De la Fé-Herrero José Manuel José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Telecommunication and Telematics Department E-mail: [email protected] Abstract Operating system level virtualization is a technology that has recently emerged into the cloud services paradigm. It has the advantage of providing better performance and scalability than para-virtualized or full virtualization hypervisors. This solution is getting accep- tance into cloud infrastructures. Nowadays public cloud Infrastructure as a Service providers offer applications based in Docker containers deployed on virtual machines.
    [Show full text]
  • Implementing and Developing Cloud Computing Applications [2011]
    Implementing and Developing Cloud Computing Applications K11513_C000.indd 1 10/18/10 2:47 PM Implementing and Developing Cloud Computing Applications DAVID E.Y. SARNA K11513_C000.indd 3 10/18/10 2:47 PM Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC Auerbach Publications is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number: 978-1-4398-3082-6 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, micro- filming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
    [Show full text]
  • Hadoop Cluster on Linode Using Ambari for Improvingtask Assignment Scheme Running in the Clouds
    Minthu Ram Chiary et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 586-589 Hadoop Cluster on Linode Using Ambari for ImprovingTask Assignment Scheme Running in the Clouds Minthu Ram Chiary, R. Anand Computer Science Of Engineering, Saveetha University Saveetha Nagar, Thandalam, Chennai – 602117,Tamil Nadu State, India Abstract: currently, data-intensive problems are so prevailing algorithm, it was called “map reduce”. Which allowed that varied organizations in varied IT industries are facing them to cut their large data calculations into small units in their business process. It's always critical for companies to and map their data to many computers, and when the process the potential of observing huge amount of calculations were done the data will be brought back information in an exceedingly smart and timely manner. together to give out the result in less time. This algorithm Mapreduce‟s code document implementation of Hadoop dramatically simplified the event of parallel information was used to develop an open source project which we now computing applications for traditional users for information know as 'Apache Hadoop' or simply just 'Hadoop', which intensive parallerly, and thus the mixture of Hadoop and allowed applications to run with the map-reduce cloud computing created large-scale parallel information algorithm. To make it more simple, simply assume that computing rather additional accessible and reliable to all or “we are processing data in parallel rather than in serial”. any or any potential users than ever before. Hadoop has Some of the largest users of hadoop are Yahoo, linkedin become the foremost in popular information management and facebook etc.
    [Show full text]
  • Malla Reddy College of Engineering and Technology
    MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY Compiled By, Faculty of Cloud Computing Department of CSE CLOUD COMPUTING Objectives 1. To understand the various distributed system models and evolving computing paradigms 2. To gain knowledge in virtualization of computer resources 3. To realize the reasons for migrating into cloud 4. To introduce the various levels of services that can be achieved by a cloud. 5. To describe the security aspects in cloud and the services offered by a cloud. UNIT- I Cloud Computing Fundamentals: Definition of Cloud computing, Roots of Cloud Computing , Layers and Types of Clouds, Desired Features of a Cloud, Cloud Infrastructure Management, Infrastructure as a Service Providers, Platform as a Service Providers. Computing Paradigms: High-Performance Computing, Parallel Computing, Distributed Computing, Cluster Computing, Grid Computing. UNIT- II Migrating into a Cloud: Introduction, Broad Approaches to Migrating into the Cloud, the Seven-Step Model of Migration into a Cloud, Enriching the ‘Integration as a Service’ Paradigm for the Cloud Era, the Onset of Knowledge Era the Evolution of SaaS, Evolution of Saas. UNIT- III Infrastructure as a Service (IAAS) & Platform (PAAS): Virtual machines provisioning and Migration services, Virtual Machines Provisioning and Manageability, Virtual Machine Migration Services, VM Provisioning and Migration in Action. On the Management of Virtual machines for Cloud Infrastructures- Aneka—Integration of Private and Public Clouds. UNIT- IV Software as a Service (SAAS) &Data Security in the Cloud: Software as a Service SAAS), Google App Engine – Centralizing Email Communications- Collaborating via Web- Based Communication Tools-An Introduction to the idea of Data Security. UNIT- V SLA Management in cloud computing: Traditional Approaches to SLO Management, Types of SLA, Life Cycle of SLA, SLA Management in Cloud.
    [Show full text]
  • Contribution to Multiuser Videoconferencing Systems Based on Cloud Computing
    UNIVERSIDAD POLITÉCNICA DE MADRID Escuela Técnica Superior de Ingenieros de Telecomunicación CONTRIBUTION TO MULTIUSER VIDEOCONFERENCING SYSTEMS BASED ON CLOUD COMPUTING TESIS DOCTORAL Javier Cerviño Arriba Ingeniero de Telecomunicación Madrid, España 2013 Departamento de Ingeniería de Sistemas Telemáticos Escuela Técnica Superior de Ingenieros de Telecomunicación CONTRIBUTION TO MULTIUSER VIDEOCONFERENCING SYSTEMS BASED ON CLOUD COMPUTING Autor: Javier Cerviño Arriba Ingeniero de Telecomunicación Director: Joaquín Salvachúa Rodríguez Doctor Ingeniero de Telecomunicación 2013 Tribunal nombrado por el Magnífico. y Excelentísimo. Sr. Rector de la Universidad Politécnica de Madrid, el día 6 de mayo de 2013. Presidente: Vocal: Vocal: Vocal: Secretario: Suplente: Suplente: Realizado el acto de defensa y lectura de la Tesis el día 6 de mayo de 2013 en Madrid, habiendo obtenido la calificación de El presidente, El secretario, Los vocales, ABSTRACT Multi-user videoconferencing systems offer communication between more than two users, who are able to interact through their webcams, microphones and other components. The use of these systems has been increased recently due to, on the one hand, improvements in Internet access, networks of companies, universities and houses, whose available bandwidth has been increased whilst the delay in sending and receiving packets has decreased. On the other hand, the advent of Rich Internet Applications (RIA) means that a large part of web application logic and control has started to be implemented on the web browsers. This has allowed developers to create web applications with a level of complexity comparable to traditional desktop applications, running on top of the Operating Systems. More recently the use of Cloud Computing systems has improved application scalability and involves a reduction in the price of backend systems.
    [Show full text]
  • How to Cite Complete Issue More Information About This Article
    Ingeniería, investigación y tecnología ISSN: 1405-7743 ISSN: 2594-0732 Facultad de Ingeniería, UNAM García-Perellada, Lilia Rosa; Vega-Gutiérrez, Sergio; Fé-Herrero, José Manuel de la; Rodríguez-De Armas, Yalina; Garófalo-Hernández, Alain Abel Driver LXC Development for OpenNebula Ingeniería, investigación y tecnología, vol. XIX, no. 1, January-March, 2018, pp. 63-76 Facultad de Ingeniería, UNAM DOI: 10.22201/fi.25940732e.2018.19n1.006 Available in: http://www.redalyc.org/articulo.oa?id=40458280006 How to cite Complete issue Scientific Information System Redalyc More information about this article Network of Scientific Journals from Latin America and the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Project academic non-profit, developed under the open access initiative INGENIERÍA INVESTIGACIÓN Y TECNOLOGÍA volumen XIX (número 1), enero-marzo 2018 63-76 ISSN 2594-0732 FI-UNAM artículo arbitrado Información del artículo: recibido: 7 de octubre de 2016, reevaluado: 12 de marzo de 2017, aceptado: 3 de julio de 2017 Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license DOI: http://dx.doi.org/10.22201/fi.25940732e.2018.19n1.006 Driver LXC development for OpenNebula Desarrollo de un driver LXC para OpenNebula García-Perellada Lilia Rosa Rodríguez-De Armas Yalina José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Faculty of Electrical Engineering Telecommunication and Telematics
    [Show full text]
  • Maturity of Cloud Application Interoperability Frameworks for Small to Medium Enterprises
    Technological University Dublin ARROW@TU Dublin Dissertations School of Computer Sciences 2015-05-10 Maturity of Cloud Application Interoperability Frameworks for Small to Medium Enterprises John Warde Technological University Dublin Follow this and additional works at: https://arrow.tudublin.ie/scschcomdis Part of the Computer Engineering Commons Recommended Citation Warde, J. Maturity of cloud application interoperability frameworks for small to medium enterprises Dissertation submitted in partial fulfilment of the equirr ements of Technological University Dublin for the degree of M.Sc. in Computing (Advanced software development) March 2015. This Theses, Masters is brought to you for free and open access by the School of Computer Sciences at ARROW@TU Dublin. It has been accepted for inclusion in Dissertations by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License Maturity of Cloud Application Interoperability Frameworks for Small to Medium Enterprises John Warde B.Sc. Hons, Computer Science, University of Limerick, 1994. National Diploma, Software Engineering, Galway-Mayo Institute of Technology, 1992. A dissertation submitted in partial fulfilment of the requirements of Dublin Institute of Technology for the degree of M.Sc. in Computing (Advanced Software Development) March 2015 I certify that this dissertation which I now submit for examination for the award of MSc in Computing (Advanced Software Development), is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work.
    [Show full text]
  • Introduction to Cloud Computing
    Introduction to Cloud computing Viet Tran Type of Cloud computing Infrastructure as a Service IaaS: offer full virtual machines via hardware virtualization tech. Amazon EC2, AbiCloud, ElasticHosts,… Platform as a Service PaaS: offer platforms (e.g. API) where users can deploy services Amazon SQS, Microsoft Azure, Google App Engine, LAMP Can be realized as IaaS+Platform (API) But can be also realized without hardware virtualization (e.g. separation via user account or sandboxing) Software as a Service: offer cloud/web applications Amazon RDS, Google Docs, … Type of Cloud computing Public clouds Sell/buy services Amazon, AbiCloud, ElasticHosts, … Limited customization, complex user management Private clouds Internal use inside organization VMWare VSphere, IBM Websphere cloud, Sun cloud More like advanced or automatized virtual infrastructure Wide customization, simple user management Infrastructure as a Service IaaS = Virtualization + Standardization + Automation Can be considered as automation tool over virtualization software (Xen, KVM, VMWare) Nearly every large software/hardware vendor offer some middleware for IaaS (for public or private cloud) IBM Websphere cloud, VMWare Vsphere, Sun Cloud, …. Opensource cloud middleware: Eucalyptus, OpenNebula, Nimbus All support Amazon EC2 client beside native client Amazon EC2 Leader of IaaS, practically standard Running on XEN/Linux Using EC2: Register, get certificate, install EC2 client Creating own image if needed and upload Run VM instances Use VM instances Creating
    [Show full text]