Dependable virtualised systems
dc.contributor.advisor
Bhatotia, Pramod
dc.contributor.advisor
Franke, Bjoern
dc.contributor.author
Thalheim, Jörg
dc.date.accessioned
2022-06-28T15:40:46Z
dc.date.available
2022-06-28T15:40:46Z
dc.date.issued
2022-06-28
dc.description.abstract
Virtual machines and containers are widely used in data centres and in the cloud for
software deployment and management. Their popularity is based on higher capacity
utilisation, lower maintenance costs, and better scalability by creating an abstraction
layer on top of physical hardware. The economics and scalability of virtualised
applications require that the workloads of multiple customers can run on the same
hardware with low overhead without compromising security. To address this need,
in this work we introduce a new set of IO middleware that allows users to run
smaller containers and virtual machines and deploy them in a more secure manner.
The presented contributions can be summarised as follows:
• CNTR provides a way to extend application containers at runtime with tools
deployed in a different container. In this way, you can create "slim" images that
contain only the actual application, while all the tools needed for monitoring,
testing, and debugging reside in a "fat" image that only needs to be deployed
when needed. CNTR achieves this by creating a nested namespace in the
application container that proxies files from a remote container using a FUSE
filesystem.
• VMSH allows users to attach services to running virtual machines independent
of the guest userspace and without any pre-installed agents. Similar to CNTR
this allows developers to build more light-weight virtual machines by deploying
additional services in a separate user-provided file system image on-demand.
VMSH achieves this by side-loading kernel code into the guest and mounting
a filesystem based on its own block device in a light-weight container without
affecting the applications in the VM.
• RKT-IO leverages trusted execution environments to run workloads in
containers and virtual machines to protect them from other tenants and the
cloud provider on the same host, but without sacrificing on I/O performance
that is usually degraded by this protection. It does so by providing a userspace
network and storage I/O stack in the form of a library OS based on Linux that
directly accesses the hardware from within the TEE by-passing the host kernel.
en
dc.identifier.uri
https://hdl.handle.net/1842/39234
dc.identifier.uri
http://dx.doi.org/10.7488/era/2485
dc.language.iso
en
en
dc.publisher
The University of Edinburgh
en
dc.relation.hasversion
CNTR : Lightweight OS Containers by Jörg Thalheim, Pramod Bhatotia, Pedro Fonseca, and Baris Kasikci, In the proceedings of USENIX ATC 2018
en
dc.relation.hasversion
VMSH : Hypervisor-agnostic Guest Overlays for VMs by Jörg Thalheim, Peter Okelmann, Harshavardhan Unnibhavi, Redha Gouicem, Pramod Bhatotia, In the proceedings of ACM EuroSys 2022
en
dc.relation.hasversion
RKT-IO : A Direct I/O Stack for Shielded Execution by Jörg Thalheim, Harshavardhan Unnibhavi, Christian Priebe, Pramod Bhatotia, and Peter Pietzuch, In the proceedings of ACM EuroSys 2021
en
dc.relation.hasversion
Sieve : Actionable insights from monitored metrics in distributed systems by Jörg Thalheim, Antonio Rodrigues, Istemi Ekin Akkus, Pramod Bhatotia, Ruichuan Chen, Bimal Viswanath, Lei Jiao, and Christof Fetzer, In the proceedings of Middleware 2017: https://dl.acm.org/doi/10.1145/3135974.3135977
en
dc.relation.hasversion
Speicher : Securing LSM-based Key-Value Stores using Shielded Execution by Maurice Bailleu, Jörg Thalheim, Pramod Bhatotia, Christof Fetzer, Michio Honda, and Kapil Vaswani, In the proceedings of Usenix FAST 2018: https://www.usenix.org/conference/fast19/presentation/bailleu
en
dc.relation.hasversion
Peter Okelmann Jörg Thalheim. Project site of vmsh. https : / / github . com / Mic92/vmsh. 2021.
en
dc.relation.hasversion
Peter Okelmann and Jø"rg Thalheim. lambda-pirate. https : / / github . com / pogobanane/lambda-pirate. 2021.
en
dc.relation.hasversion
J. Thalheim, P. Bhatotia, and C. Fetzer. “INSPECTOR: Data Provenance Using Intel Processor Trace (PT)”. In: 2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS). 2016
en
dc.subject
virtualisation technology security
en
dc.subject
trusted execution environment
en
dc.subject
TEE
en
dc.subject
RKT-IO
en
dc.title
Dependable virtualised systems
en
dc.type
Thesis or Dissertation
en
dc.type.qualificationlevel
Doctoral
en
dc.type.qualificationname
PhD Doctor of Philosophy
en
Files
Original bundle
1 - 1 of 1
- Name:
- Thalheim2022.pdf
- Size:
- 10.57 MB
- Format:
- Adobe Portable Document Format
- Description:
This item appears in the following Collection(s)

