First International Workshop on Virtualization Technology in Distributed Computing (VTDC 2006) 2006
DOI: 10.1109/vtdc.2006.8
|View full text |Cite
|
Sign up to set email alerts
|

On the Design of Virtual Machine Sandboxes for Distributed Computing in Wide-area Overlays of Virtual Workstations

Abstract: With recent advances in virtual computing and the revelation that compute-intensive tasks run well on system virtual machines (VMs), the ability to develop, deploy, and manage distributed systems has been ameliorated. This paper explores the design space of VM-based sandboxes where the following techniques that facilitate the deployment of secure nodes in Widearea Overlays of virtual Workstations (WOWs) are employed: DHCP-based virtual IP address allocation, self-configuring virtual networks supporting peer-to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0
1

Year Published

2008
2008
2016
2016

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 30 publications
(35 citation statements)
references
References 27 publications
0
34
0
1
Order By: Relevance
“…The TCP/IP traffic that is generated by a VM is completely confined to the virtual network, as described in [27]. Archer hosts are authenticated and traffic is encrypted end-to-end by deploying an security stack in each VM based on public key cryptography (PKI).…”
Section: Security Considerationsmentioning
confidence: 99%
See 2 more Smart Citations
“…The TCP/IP traffic that is generated by a VM is completely confined to the virtual network, as described in [27]. Archer hosts are authenticated and traffic is encrypted end-to-end by deploying an security stack in each VM based on public key cryptography (PKI).…”
Section: Security Considerationsmentioning
confidence: 99%
“…User data and local configurations remain unmodified in the VM after the upgrade as they are stored in different stacks of the file system [27].…”
Section: Security Considerationsmentioning
confidence: 99%
See 1 more Smart Citation
“…As an example, a VCN can exploit its own routing strategy and use ad hoc algorithms to map information onto the VMs. [19] considers VM sandboxes to simplify the deployment of collaborative environments over wide-area networks. VM sandboxes are virtual appliances [20], configured and developed by the administrators of the collaborative environments, and made available to multiple users.…”
Section: Related Workmentioning
confidence: 99%
“…Some of popular volunteer computing systems are BOINC [5], condorlike grid system [6][7][8], Entropia [9], XtremeWeb [10], Aneka [11], SZTAKI [12], QADPZ [13], and IPOP/WOW [14]. Peer-to-Peer (P2P) based VC systems represent a decentralized, self-organized, and scalable environment for running applications such as PastryGrid [15], BonjourGrid [16], ShareGrid [17], Condor-Flock P2P [18], and Self-Gridron [19].…”
Section: Introductionmentioning
confidence: 99%