Virtual Machine Extrospection: a Reverse Information Retrieval in Clouds 1P.Vijay Bhaskar Reddy2n.Venkateswarlu

Total Page:16

File Type:pdf, Size:1020Kb

Virtual Machine Extrospection: a Reverse Information Retrieval in Clouds 1P.Vijay Bhaskar Reddy2n.Venkateswarlu International Journal of Research in Engineering, IT and Social Science, ISSN 2250-0588, Impact Factor: 6.565, Volume 09, Special Issue 4, May 2019, Page 239-253 Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds 1P.Vijay Bhaskar Reddy2N.Venkateswarlu 2 Scholar, Dept. of Master of Computer Applications, Narayana Engineering College, Gudur. 1 Assistant Professor, Dept. of Master of Computer Applications, Narayana Engineering College, Gudur. Abstract—In a virtualized environment, it is not Asthehypervisor runsatamoreprivilegedlevelthan difficult to retrieve guest OS information from its its guest OSes, at this level, one can control hypervisor. However, it is very challenging to physical resources, monitor their access, and be retrieve information in the reverse direction, i.e., isolated from tampering against attackers from the retrieve the hypervisor information from within a guest OS. Monitoring offline-grained information guest OS, which remains an open problem and of the guest OSes from the underlying hypervisoris has not yet been comprehensively studied before. called virtual machine introspection (VMI)[1]. In this paper, we take the initiative and study this However, at the guest OS level retrieving reverse information retrieval problem. In information about the underlying hypervisor particular, we investigate how to determine the becomes very challenging, if not impossible. In host OS kernel version from within a guest OS. thispaper,welabelthereverseinformationretrievalwit We observe that modern commodity hypervisors h the coined term virtual machine introduce new features and bug fixes in almost extrospection(VME).While VMI has been widely every new release. Thus, by carefully analyzing used for securitypurposesduring the past decade, the seven-year evolution of Linux KVM the reverse directionVME—theprocedurethat development (including 3485 patches), we can retrieves the hypervisor information from identify 19 features and 20 bugs in the hypervisor theguestOS level—is a new topic and has not detectable from within a guest OS. Building on beencomprehensively studied before. our detection of these features and bugs, we VME can be critically important for both malicious at- tackers and regular users. On one present a novel framework called Hyperprobe hand, from the attackers’ perspective, when an that for the first time enables users in a guest OS attacker is in control of a virtual machine (VM), to automatically detect the underlying host OS either as a legal resident or after a successful kernel version in a few minutes. We implement a compromise of the victim’s VM, the underlying prototype of Hyperprobe and evaluate its hypervisor becomes its attacking target. This threat effectiveness in six real world clouds, including has been demon- strated in [8], [9], where an Google Compute Engine (a.k.a. Google Cloud), attacker is able to mount a privilege escalation HP Helion Public Cloud, ElasticHosts, Joyent attack from within a VMware virtual machine and Cloud, CloudSigma, and VULTR, as well as in a a KVM-based virtual machine, respectively, and controlled testbed environment, all yielding then gains some control of the host machine. promising results. Although these works demonstrate the possibility of such a threat, successful escape attacks from the Index Terms—Virtualization, Hypervisor, guest to the host are rare. The primary reason is Extrospection, Linux, KVM. that most hypervisors are, by design, invisible to the VMs. Therefore, even if an attacker 1.INTRODUCTION gainsfull control of a VM, a successful attempt to prevalent,a variety of security methodologies break out of theVM and break into the hypervisor havebeende- veloped at the hypervisor level, requires an in-depth knowl- edge of the underlying includingintrusionand hypervisor, e.g., type and version of the malwaredetection[1],[2],honeypots[3],[4],kernelro hypervisor. However, there is no straightforward otkitdefense [5], [6], and detection of way for attackers to obtain suchknowledge. covertlyexecutingbinaries[7]. These security On the other hand, benign cloud users services depend on the key may also need to know the factorthatthehypervisorisisolatedfromitsguestOSes. underlyinghypervisor information. It is com- http://indusedu.org Page 239 This work is licensed under a Creative Commons Attribution 4.0 International License International Journal of Research in Engineering, IT and Social Science, ISSN 2250-0588, Impact Factor: 6.565, Volume 09, Special Issue 4, May 2019, Page 239-253 monly known that hardware and software Hyperprobe, we per- form experiments in a systems both have various bugs and controlled testbedenviron- ment. For 11 of the 35 vulnerabilities, and different hard- kernel versions we studied, Hyperprobe can ware/software may exhibit different correctly infer the exact version vulnerabilities. Cloud customers, when number;fortherest,Hyperprobecannarrowitdown to making decisions on the choice of a cloud within 2 to 5versions. provider, may want to know more The remainder of the paper is organized as information about the underlying hardware or follows. Section 2 describes the background of our software. This will help customers determine work. Section 3 presents the design of Hyperprobe. whether the underlying hardware/software Section 4 detailsthe implementation of Hyperprobe can be trusted, and thus help them decide with several case studies. Section 5 presents whether or not to use this cloud service. experimental results on virtual machines in the However, for security reasons, cloud cloud and our controlled testbed. Section 6 providers usually do not release such discusses some potential extensions to the sensitive information to the public framework. Section 7 sur- orcustomers. veysrelatedwork,andfinally,Section8concludesthep Whereas research efforts have been made to aper. detect the existence of a hypervisor [10], [11], [12], [13], from a guest OS, to the best of our 2 BACKGROUND knowledge, there is no literature describing how Hypervisor, also named as virtual machine to retrieve more detailed information about the monitor, is a piece of software that creates and hypervisor, e.g., the kernel version of the host manages VMs. Tradition- ally, hypervisors such as OS, the distribution of the host OS (Fedora, VMware and Virtual PC use the technique of SuSE, or Ubuntu?), the CPU type, the memory binary translation to implement virtualization. type, or any hardware informa- tion. In this Later on, x86 processor vendors including Intel paper, we make an attempt to investigate this and AMD released their architecture extensions to problem. More specifically, as a first step support virtualiza- towards VME, we study the problem of tion.Thosehypervisorsthatusebinarytranslationarec detecting/inferring the host OS kernel version alled software-only hypervisors, and recent from within a guest OS, and we expect our hypervisors that take advantage of these processor work will inspire more attention on mining the extensions are calledhardware assisted hypervisors information of a hypervisor. The major research [20]. In this paper, we focus on a popular hardware contributions of our work are summarized assisted commodity hypervisor, Linux KVM. We asfollows: develop our framework and performexperiments Wearethefirsttostudytheproblemofdetec- on a physical machine with Linux OS as the host, ing/inferring the host OS kernel version from which runs a KVM hypervisor, and a VM is within a VM. Exploring the evolution of Linux running on top of the KVM hy- pervisors, we analyze various features hypervisor.OurstudycoversLinuxkernelversionsfro and bugs introduced in the KVM hypervisor; and m then we explain how these features and bugs can 2.6.20 to 3.14. While 2.6.20, released in February be used to detect/infer the hypervisor kernel 2007, is the first kernel version that includes version. KVM, 3.14, released in March 2014, is the latest stable kernel at the time of this study. More .We design and implement a novel, practical, auto- specifically, we study the evolution of KVM over matic, and extensible framework, called the past seven years and make three major Hyperprobe, for conducting the reverse observa- tions. In this section, we briefly describe information retrieval. Hy- perprobe can help users Linux KVM and report ourobservations. in a VM to automatically detect/infer the 2.1 LinuxKVM underlying host OS kernel version in less than five minutes with highaccuracy. KVM refers to kernel-based virtual machine. Since .We perform our experiments in six real world Linux kernel version 2.6.20, KVM is merged into clouds, including Google Compute Engine [14], the Linux main- line kernel as a couple of kernel HP Helion Public Cloud [15], ElasticHosts [16], modules: an architecture JoyentCloud [17], CloudSigma [18], and VULTR [19], and our experimental results are very promising. To fur- ther validate the accuracy of http://indusedu.org Page 240 This work is licensed under a Creative Commons Attribution 4.0 International License International Journal of Research in Engineering, IT and Social Science, ISSN 2250-0588, Impact Factor: 6.565, Volume 09, Special Issue 4, May 2019, Page 239-253 Qemu Qemu emulating a CPU is hard. Since a modern CPU App App Normal User Normal User defines hundreds of registers, emulating the Process behaviors of various registers correctly is Guest Guest Process OS OS challenging. Failing to do so usually causes various unexpected results. In fact, register Linux Kernel KVM related bugs have been reported on a regularbasis.
Recommended publications
  • Arquitecturas Para La Federación De Proveedores Cloud
    Arquitecturas para la Federación de Proveedores Cloud Daniel Molina Aranda MÁSTER EN INVESTIGACIÓN EN INFORMÁTICA. FACULTAD DE INFORMÁTICA UNIVERSIDAD COMPLUTESNE DE MADRID Trabajo Fin Máster en Ingeniería de Computadores 2010-2011 Director/es y/o colaborador: Rubén Santiago Montero Ignacio Martín Llorente Convocatoria: Septiembre 2011 Calicación: 8 Autorización de difusión Daniel Molina Aranda 2010-2011 El/la abajo rmante, matriculado/a en el Máster en Investigación en Informática de la Facultad de Informática, autoriza a la Universidad Complutense de Madrid (UCM) a difundir y utilizar con nes académicos, no comerciales y mencionando expresamente a su autor el presente Trabajo Fin de Máster: Arquitecturas para la Federación de Proveedores Cloud, realizado durante el curso académico 2010-2011 bajo la dirección de Rubén Santiago Montero e Ignacio Martín Llorente en el Departamento de Arquitectura de Computadores, y a la Biblioteca de la UCM a depositarlo en el Archivo Institucional E-Prints Complutense con el objeto de incrementar la difusión, uso e impacto del trabajo en Internet y garantizar su preservación y acceso a largo plazo. Resumen en castellano Este trabajo analiza el modelo de cloud híbrido, un paradigma que combina los depliegues de cloud privado con los recursos ofrecidos por cloud públicos. Este nuevo modelo no está totalmente desarrollado todavía, y hay que dedicar mucha más investigación y desarrollo antes de conseguir que despliegues multi-cloud puedan ser usados en producción. En este trabajo se realiza un estudio de las limitaciones y desafíos de este modelo y a su vez se plantean algunas de la técnicas más comunes para lidiar con estos puntos.
    [Show full text]
  • TOOLS for CLOUD COMPUTING Eucalyptus, Opennebula and Tashi
    TOOLS FOR CLOUD COMPUTING Eucalyptus, OpenNebula and Tashi Gustavo Ansaldi Oliva [email protected] [email protected] Agenda • Basic Concepts • Eucalyptus • OpenNebula • Tashi • Tools Comparison • Extra: Amazon EC2 API 05/07/2010 Gustavo Ansaldi Oliva 2 Basic Concepts • Virtualization – Hypervisor • A.K.A Virtual Machine Monitor (VMM) • Allows multiple operating systems to run concurrently on a host computer— a feature called hardware virtualization • The hypervisor presents the guest OSs with a virtual platform and monitors the execution of the guest OSs • Type 1/native/baremetal: Xen • Type 2/hosted: VMWare Server, Sun VirtualBox 05/07/2010 Gustavo Ansaldi Oliva 3 Basic Concepts • Virtualization – Hardware-assisted virtualization • Processor instruction set extensions that provide hardware assistance to virtual machines • These extensions address the parts of x86 that are difficult or inefficient to virtualize, providing additional support to the hypervisor. • Enables simpler virtualization code and a higher performance for full virtualization. • Intel VT-x, AMD-V 05/07/2010 Gustavo Ansaldi Oliva 4 Basic Concepts • Virtualization – KVM • Kernel-based Virtual Machine • Full virtualization solution for Linux on x86 hardware • Requires processor with Intel VT or AMD-V • KVM does not perform any emulation by itself. • User-space program uses the /dev/kvm interface to set up the guest VM's address space, feeds it simulated I/O and maps its video display back onto the host's • KVM uses QEMU for its device emulation 05/07/2010 Gustavo Ansaldi
    [Show full text]
  • Lighthouse 5 User Guide
    Lighthouse 5 User Guide Revision 5.3.0.1 2019-04-12 2 Lighthouse 5 User Guide TABLE OF CONTENTS 1. About this User Guide 6 2. Lighthouse overview 7 2.1 Lighthouse VM 5 host requirements 7 2.2 Lighthouse architecture 7 2.2.1 Lighthouse to Node interactions 8 2.2.2 User to Lighthouse interactions 8 2.2.3 Node organization and filtering 9 2.2.4 Multiple Instance Feature 9 3. Lighthouse VM installation 10 3.1 Lighthouse VM components 10 3.2 VMware vSphere 6.0 via the VMware vSphere 6.0 client on Windows 10 3.2.1 Launch the vSphere Client and connect to a vSphere instance. 10 3.2.2 Import the Lighthouse VM Open Volume Format (.ovf) image 11 3.2.3 Launch the Opengear Lighthouse virtual machine 13 3.2.4 Access the console of a running but headless Opengear Lighthouse instance 13 3.3 VMware Workstation Player on Windows as host 14 3.4 VMware Workstation Pro on Windows as host 15 3.5 VMware Workstation Player or Pro on Fedora Workstation as host 15 3.6 Local deployment on Hyper-V running on Windows 10/Windows Server 2016 15 3.7 Remote Hyper-V deployment with pre-authenticated user 16 3.8 Remote Hyper-V deployment with different user 16 3.9 VirtualBox on Windows as host 17 3.10 VirtualBox on macOS as host 18 3.11 VirtualBox on Ubuntu as host 19 3.12 VirtualBox on Fedora Workstation as host 20 3.13 Virtual Machine Manager (KVM) on Ubuntu as host 20 3.14 Boxes on Fedora Workstation as host 21 3.15 Boxes on CentOS as host 21 3.16 Google Compute Engine environment 22 4.
    [Show full text]
  • Cohesiveft Adds Internal Eucalyptus Cloud Deployment Option to Its Elastic Server(R) Platform
    Source: Cohesive Networks April 23, 2009 12:11 ET CohesiveFT Adds Internal Eucalyptus Cloud Deployment Option to Its Elastic Server(R) Platform Custom Elastic Servers Configured, Assembled, and Deployed to Ubuntu Enterprise Cloud CHICAGO, IL--(Marketwire - April 23, 2009) - CohesiveFT (http://www.cohesiveft.com), the leader in onboarding solutions for virtual and cloud computing infrastructures, today announced a technology preview of Elastic Server deployment to Eucalyptus private clouds. Elastic Server Personal Edition users can now dynamically deploy custom servers to a private Eucalyptus cloud infrastructure hosted on their own network. This technology preview comes on the heels of the release of Ubuntu 9.04 Server Edition which includes a technology preview for the new Ubuntu Enterprise Cloud powered by the open-source Eucalyptus system. "The inclusion of the Ubuntu Enterprise Cloud in the Ubuntu 9.04 Server Edition release opens up many opportunities for private cloud computing in the enterprise," said Simon Wardley, Software Services Manager Canonical. "CohesiveFT is well positioned to help organizations leverage this new and exciting technology." With the combined solution from Canonical and CohesiveFT, organizations can build, populate, and evaluate internal Eucalyptus clouds without the latency or security issues associated with public cloud computing. Additionally, Eucalyptus shares API compatibility with Amazon Web Services' EC2, giving organizations interested in migrating to the cloud a suitable, local test environment. Ubuntu 9.04 Server Edition has made Eucalyptus extremely easy to configure and deploy through its integration into Ubuntu Enterprise Cloud. Elastic Server can be used to automatically deploy custom servers to Ubuntu Enterprise Cloud infrastructure quickly and easily.
    [Show full text]
  • Driver LXC Development for Opennebula Desarrollo De Un
    INGENIERÍA INVESTIGACIÓN Y TECNOLOGÍA volumen XIX (número 1), enero-marzo 2018 63-76 ISSN 2594-0732 FI-UNAM artículo arbitrado Información del artículo: recibido: 7 de octubre de 2016, reevaluado: 12 de marzo de 2017, aceptado: 3 de julio de 2017 Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license DOI: http://dx.doi.org/10.22201/fi.25940732e.2018.19n1.006 Driver LXC development for OpenNebula Desarrollo de un driver LXC para OpenNebula García-Perellada Lilia Rosa Rodríguez-De Armas Yalina José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Faculty of Electrical Engineering Telecommunication and Telematics Department Information and Communication Technologies Services Department E-mail: [email protected] E-mail: [email protected] Vega-Gutiérrez Sergio Garófalo-Hernández Alain Abel José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Electrical Engineering Faculty Telecommunication and Telematics Department Telecommunication and Telematics Department E-mail: [email protected] E-mail: [email protected] De la Fé-Herrero José Manuel José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Telecommunication and Telematics Department E-mail: [email protected] Abstract Operating system level virtualization is a technology that has recently emerged into the cloud services paradigm. It has the advantage of providing better performance and scalability than para-virtualized or full virtualization hypervisors. This solution is getting accep- tance into cloud infrastructures. Nowadays public cloud Infrastructure as a Service providers offer applications based in Docker containers deployed on virtual machines.
    [Show full text]
  • Implementing and Developing Cloud Computing Applications [2011]
    Implementing and Developing Cloud Computing Applications K11513_C000.indd 1 10/18/10 2:47 PM Implementing and Developing Cloud Computing Applications DAVID E.Y. SARNA K11513_C000.indd 3 10/18/10 2:47 PM Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC Auerbach Publications is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number: 978-1-4398-3082-6 (Hardback) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, micro- filming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
    [Show full text]
  • Hadoop Cluster on Linode Using Ambari for Improvingtask Assignment Scheme Running in the Clouds
    Minthu Ram Chiary et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 586-589 Hadoop Cluster on Linode Using Ambari for ImprovingTask Assignment Scheme Running in the Clouds Minthu Ram Chiary, R. Anand Computer Science Of Engineering, Saveetha University Saveetha Nagar, Thandalam, Chennai – 602117,Tamil Nadu State, India Abstract: currently, data-intensive problems are so prevailing algorithm, it was called “map reduce”. Which allowed that varied organizations in varied IT industries are facing them to cut their large data calculations into small units in their business process. It's always critical for companies to and map their data to many computers, and when the process the potential of observing huge amount of calculations were done the data will be brought back information in an exceedingly smart and timely manner. together to give out the result in less time. This algorithm Mapreduce‟s code document implementation of Hadoop dramatically simplified the event of parallel information was used to develop an open source project which we now computing applications for traditional users for information know as 'Apache Hadoop' or simply just 'Hadoop', which intensive parallerly, and thus the mixture of Hadoop and allowed applications to run with the map-reduce cloud computing created large-scale parallel information algorithm. To make it more simple, simply assume that computing rather additional accessible and reliable to all or “we are processing data in parallel rather than in serial”. any or any potential users than ever before. Hadoop has Some of the largest users of hadoop are Yahoo, linkedin become the foremost in popular information management and facebook etc.
    [Show full text]
  • Malla Reddy College of Engineering and Technology
    MALLA REDDY COLLEGE OF ENGINEERING AND TECHNOLOGY Compiled By, Faculty of Cloud Computing Department of CSE CLOUD COMPUTING Objectives 1. To understand the various distributed system models and evolving computing paradigms 2. To gain knowledge in virtualization of computer resources 3. To realize the reasons for migrating into cloud 4. To introduce the various levels of services that can be achieved by a cloud. 5. To describe the security aspects in cloud and the services offered by a cloud. UNIT- I Cloud Computing Fundamentals: Definition of Cloud computing, Roots of Cloud Computing , Layers and Types of Clouds, Desired Features of a Cloud, Cloud Infrastructure Management, Infrastructure as a Service Providers, Platform as a Service Providers. Computing Paradigms: High-Performance Computing, Parallel Computing, Distributed Computing, Cluster Computing, Grid Computing. UNIT- II Migrating into a Cloud: Introduction, Broad Approaches to Migrating into the Cloud, the Seven-Step Model of Migration into a Cloud, Enriching the ‘Integration as a Service’ Paradigm for the Cloud Era, the Onset of Knowledge Era the Evolution of SaaS, Evolution of Saas. UNIT- III Infrastructure as a Service (IAAS) & Platform (PAAS): Virtual machines provisioning and Migration services, Virtual Machines Provisioning and Manageability, Virtual Machine Migration Services, VM Provisioning and Migration in Action. On the Management of Virtual machines for Cloud Infrastructures- Aneka—Integration of Private and Public Clouds. UNIT- IV Software as a Service (SAAS) &Data Security in the Cloud: Software as a Service SAAS), Google App Engine – Centralizing Email Communications- Collaborating via Web- Based Communication Tools-An Introduction to the idea of Data Security. UNIT- V SLA Management in cloud computing: Traditional Approaches to SLO Management, Types of SLA, Life Cycle of SLA, SLA Management in Cloud.
    [Show full text]
  • Contribution to Multiuser Videoconferencing Systems Based on Cloud Computing
    UNIVERSIDAD POLITÉCNICA DE MADRID Escuela Técnica Superior de Ingenieros de Telecomunicación CONTRIBUTION TO MULTIUSER VIDEOCONFERENCING SYSTEMS BASED ON CLOUD COMPUTING TESIS DOCTORAL Javier Cerviño Arriba Ingeniero de Telecomunicación Madrid, España 2013 Departamento de Ingeniería de Sistemas Telemáticos Escuela Técnica Superior de Ingenieros de Telecomunicación CONTRIBUTION TO MULTIUSER VIDEOCONFERENCING SYSTEMS BASED ON CLOUD COMPUTING Autor: Javier Cerviño Arriba Ingeniero de Telecomunicación Director: Joaquín Salvachúa Rodríguez Doctor Ingeniero de Telecomunicación 2013 Tribunal nombrado por el Magnífico. y Excelentísimo. Sr. Rector de la Universidad Politécnica de Madrid, el día 6 de mayo de 2013. Presidente: Vocal: Vocal: Vocal: Secretario: Suplente: Suplente: Realizado el acto de defensa y lectura de la Tesis el día 6 de mayo de 2013 en Madrid, habiendo obtenido la calificación de El presidente, El secretario, Los vocales, ABSTRACT Multi-user videoconferencing systems offer communication between more than two users, who are able to interact through their webcams, microphones and other components. The use of these systems has been increased recently due to, on the one hand, improvements in Internet access, networks of companies, universities and houses, whose available bandwidth has been increased whilst the delay in sending and receiving packets has decreased. On the other hand, the advent of Rich Internet Applications (RIA) means that a large part of web application logic and control has started to be implemented on the web browsers. This has allowed developers to create web applications with a level of complexity comparable to traditional desktop applications, running on top of the Operating Systems. More recently the use of Cloud Computing systems has improved application scalability and involves a reduction in the price of backend systems.
    [Show full text]
  • How to Cite Complete Issue More Information About This Article
    Ingeniería, investigación y tecnología ISSN: 1405-7743 ISSN: 2594-0732 Facultad de Ingeniería, UNAM García-Perellada, Lilia Rosa; Vega-Gutiérrez, Sergio; Fé-Herrero, José Manuel de la; Rodríguez-De Armas, Yalina; Garófalo-Hernández, Alain Abel Driver LXC Development for OpenNebula Ingeniería, investigación y tecnología, vol. XIX, no. 1, January-March, 2018, pp. 63-76 Facultad de Ingeniería, UNAM DOI: 10.22201/fi.25940732e.2018.19n1.006 Available in: http://www.redalyc.org/articulo.oa?id=40458280006 How to cite Complete issue Scientific Information System Redalyc More information about this article Network of Scientific Journals from Latin America and the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Project academic non-profit, developed under the open access initiative INGENIERÍA INVESTIGACIÓN Y TECNOLOGÍA volumen XIX (número 1), enero-marzo 2018 63-76 ISSN 2594-0732 FI-UNAM artículo arbitrado Información del artículo: recibido: 7 de octubre de 2016, reevaluado: 12 de marzo de 2017, aceptado: 3 de julio de 2017 Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) license DOI: http://dx.doi.org/10.22201/fi.25940732e.2018.19n1.006 Driver LXC development for OpenNebula Desarrollo de un driver LXC para OpenNebula García-Perellada Lilia Rosa Rodríguez-De Armas Yalina José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba José Antonio Echeverría Higher Polytechnic Institute, La Habana, Cuba Electrical Engineering Faculty Faculty of Electrical Engineering Telecommunication and Telematics
    [Show full text]
  • Maturity of Cloud Application Interoperability Frameworks for Small to Medium Enterprises
    Technological University Dublin ARROW@TU Dublin Dissertations School of Computer Sciences 2015-05-10 Maturity of Cloud Application Interoperability Frameworks for Small to Medium Enterprises John Warde Technological University Dublin Follow this and additional works at: https://arrow.tudublin.ie/scschcomdis Part of the Computer Engineering Commons Recommended Citation Warde, J. Maturity of cloud application interoperability frameworks for small to medium enterprises Dissertation submitted in partial fulfilment of the equirr ements of Technological University Dublin for the degree of M.Sc. in Computing (Advanced software development) March 2015. This Theses, Masters is brought to you for free and open access by the School of Computer Sciences at ARROW@TU Dublin. It has been accepted for inclusion in Dissertations by an authorized administrator of ARROW@TU Dublin. For more information, please contact [email protected], [email protected]. This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 4.0 License Maturity of Cloud Application Interoperability Frameworks for Small to Medium Enterprises John Warde B.Sc. Hons, Computer Science, University of Limerick, 1994. National Diploma, Software Engineering, Galway-Mayo Institute of Technology, 1992. A dissertation submitted in partial fulfilment of the requirements of Dublin Institute of Technology for the degree of M.Sc. in Computing (Advanced Software Development) March 2015 I certify that this dissertation which I now submit for examination for the award of MSc in Computing (Advanced Software Development), is entirely my own work and has not been taken from the work of others save and to the extent that such work has been cited and acknowledged within the text of my work.
    [Show full text]
  • Introduction to Cloud Computing
    Introduction to Cloud computing Viet Tran Type of Cloud computing Infrastructure as a Service IaaS: offer full virtual machines via hardware virtualization tech. Amazon EC2, AbiCloud, ElasticHosts,… Platform as a Service PaaS: offer platforms (e.g. API) where users can deploy services Amazon SQS, Microsoft Azure, Google App Engine, LAMP Can be realized as IaaS+Platform (API) But can be also realized without hardware virtualization (e.g. separation via user account or sandboxing) Software as a Service: offer cloud/web applications Amazon RDS, Google Docs, … Type of Cloud computing Public clouds Sell/buy services Amazon, AbiCloud, ElasticHosts, … Limited customization, complex user management Private clouds Internal use inside organization VMWare VSphere, IBM Websphere cloud, Sun cloud More like advanced or automatized virtual infrastructure Wide customization, simple user management Infrastructure as a Service IaaS = Virtualization + Standardization + Automation Can be considered as automation tool over virtualization software (Xen, KVM, VMWare) Nearly every large software/hardware vendor offer some middleware for IaaS (for public or private cloud) IBM Websphere cloud, VMWare Vsphere, Sun Cloud, …. Opensource cloud middleware: Eucalyptus, OpenNebula, Nimbus All support Amazon EC2 client beside native client Amazon EC2 Leader of IaaS, practically standard Running on XEN/Linux Using EC2: Register, get certificate, install EC2 client Creating own image if needed and upload Run VM instances Use VM instances Creating
    [Show full text]