Edinburgh Research Archive

Dependable virtualised systems

dc.contributor.advisor
Bhatotia, Pramod
dc.contributor.advisor
Franke, Bjoern
dc.contributor.author
Thalheim, Jörg
dc.date.accessioned
2022-06-28T15:40:46Z
dc.date.available
2022-06-28T15:40:46Z
dc.date.issued
2022-06-28
dc.description.abstract
Virtual machines and containers are widely used in data centres and in the cloud for software deployment and management. Their popularity is based on higher capacity utilisation, lower maintenance costs, and better scalability by creating an abstraction layer on top of physical hardware. The economics and scalability of virtualised applications require that the workloads of multiple customers can run on the same hardware with low overhead without compromising security. To address this need, in this work we introduce a new set of IO middleware that allows users to run smaller containers and virtual machines and deploy them in a more secure manner. The presented contributions can be summarised as follows: • CNTR provides a way to extend application containers at runtime with tools deployed in a different container. In this way, you can create "slim" images that contain only the actual application, while all the tools needed for monitoring, testing, and debugging reside in a "fat" image that only needs to be deployed when needed. CNTR achieves this by creating a nested namespace in the application container that proxies files from a remote container using a FUSE filesystem. • VMSH allows users to attach services to running virtual machines independent of the guest userspace and without any pre-installed agents. Similar to CNTR this allows developers to build more light-weight virtual machines by deploying additional services in a separate user-provided file system image on-demand. VMSH achieves this by side-loading kernel code into the guest and mounting a filesystem based on its own block device in a light-weight container without affecting the applications in the VM. • RKT-IO leverages trusted execution environments to run workloads in containers and virtual machines to protect them from other tenants and the cloud provider on the same host, but without sacrificing on I/O performance that is usually degraded by this protection. It does so by providing a userspace network and storage I/O stack in the form of a library OS based on Linux that directly accesses the hardware from within the TEE by-passing the host kernel.
en
dc.identifier.uri
https://hdl.handle.net/1842/39234
dc.identifier.uri
http://dx.doi.org/10.7488/era/2485
dc.language.iso
en
en
dc.publisher
The University of Edinburgh
en
dc.relation.hasversion
CNTR : Lightweight OS Containers by Jörg Thalheim, Pramod Bhatotia, Pedro Fonseca, and Baris Kasikci, In the proceedings of USENIX ATC 2018
en
dc.relation.hasversion
VMSH : Hypervisor-agnostic Guest Overlays for VMs by Jörg Thalheim, Peter Okelmann, Harshavardhan Unnibhavi, Redha Gouicem, Pramod Bhatotia, In the proceedings of ACM EuroSys 2022
en
dc.relation.hasversion
RKT-IO : A Direct I/O Stack for Shielded Execution by Jörg Thalheim, Harshavardhan Unnibhavi, Christian Priebe, Pramod Bhatotia, and Peter Pietzuch, In the proceedings of ACM EuroSys 2021
en
dc.relation.hasversion
Sieve : Actionable insights from monitored metrics in distributed systems by Jörg Thalheim, Antonio Rodrigues, Istemi Ekin Akkus, Pramod Bhatotia, Ruichuan Chen, Bimal Viswanath, Lei Jiao, and Christof Fetzer, In the proceedings of Middleware 2017: https://dl.acm.org/doi/10.1145/3135974.3135977
en
dc.relation.hasversion
Speicher : Securing LSM-based Key-Value Stores using Shielded Execution by Maurice Bailleu, Jörg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani, In the proceedings of Usenix FAST 2018: https://www.usenix.org/conference/fast19/presentation/bailleu
en
dc.relation.hasversion
Peter Okelmann Jörg Thalheim. Project site of vmsh. https : / / github . com / Mic92/vmsh. 2021.
en
dc.relation.hasversion
Peter Okelmann and Jø"rg Thalheim. lambda-pirate. https : / / github . com / pogobanane/lambda-pirate. 2021.
en
dc.relation.hasversion
J. Thalheim, P. Bhatotia, and C. Fetzer. “INSPECTOR: Data Provenance Using Intel Processor Trace (PT)”. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). 2016
en
dc.subject
virtualisation technology security
en
dc.subject
trusted execution environment
en
dc.subject
TEE
en
dc.subject
RKT-IO
en
dc.title
Dependable virtualised systems
en
dc.type
Thesis or Dissertation
en
dc.type.qualificationlevel
Doctoral
en
dc.type.qualificationname
PhD Doctor of Philosophy
en

Files

Original bundle

Now showing 1 - 1 of 1
Name:
Thalheim2022.pdf
Size:
10.57 MB
Format:
Adobe Portable Document Format
Description:

This item appears in the following Collection(s)