Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Syst 2019
DOI: 10.1145/3297858.3304034
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure

Abstract: High availability is the most important and challenging problem for cloud providers. However, virtual machine monitor (VMM), a crucial component of the cloud infrastructure, has to be frequently updated and restarted to add security patches and new features, undermining high availability. There are two existing live update methods to improve the cloud availability: kernel live patching and Virtual Machine (VM) live migration. However, they both have serious drawbacks that impair their usefulness in the large c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(25 citation statements)
references
References 19 publications
0
25
0
Order By: Relevance
“…Some recent projects aim at supporting live reboot and/or upgrade of VMMs without disrupting the VMs [36], [37]. These techniques are focused on code updates for improving the safety and security of the hypervisor component.…”
Section: E Scheduling Optimizationsmentioning
confidence: 99%
“…Some recent projects aim at supporting live reboot and/or upgrade of VMMs without disrupting the VMs [36], [37]. These techniques are focused on code updates for improving the safety and security of the hypervisor component.…”
Section: E Scheduling Optimizationsmentioning
confidence: 99%
“…These attacks include VM creation, VM manipulation, VM deletion, resource quota amendment and changes etc. the attacker can also play with access privileges allocated to explicit VMs [47].…”
Section: Vm Escapementioning
confidence: 99%
“…Dos attacks can also be applied against hypervisor, where attacker intends to utilize maximum resources and services memory, bandwidth, CPU cycles etc. to degrade the performance of cloud environment, by leveraging hypervisor's design flaws and misconfigurations [47]. DoS attacks can also occur because of the weaknesses in various communication protocols like TCP Sessions hijacking, IP Spoofing, and Corrupting DNS Server Cache.…”
Section: Denial Of Servicementioning
confidence: 99%
“…In contrast, current approaches are based on different assumptions: low-level solutions (BIOSes/OSes) are efficient but only support a fixed capacity and a limited set of resources that are known a priori, whereas higher-level solutions employed in distributed systems are more flexible but have more overheads and are not designed for the same time scales. Some of these issues might nonetheless be alleviated by leveraging recent approaches such as live hypervisor upgrade solutions [35].…”
Section: Long-term Challengesmentioning
confidence: 99%