DocumentCode
3064807
Title
VM Leakage and Orphan Control in Open-Source Clouds
Author
Dabrowsk, C. ; Mills, K.
Author_Institution
Inf. Technol. Lab., NIST, Gaithersburg, MD, USA
fYear
2011
fDate
Nov. 29 2011-Dec. 1 2011
Firstpage
554
Lastpage
559
Abstract
Computer systems often exhibit degraded performance due to resource leakage caused by erroneous programming or malicious attacks, and computers can even crash in extreme cases of resource exhaustion. The advent of cloud computing provides increased opportunities to amplify such vulnerabilities, thus affecting a significant number of computer users. Using simulation, we demonstrate that cloud computing systems based on open-source code could be subjected to a simple malicious attack capable of degrading availability of virtual machines (VMs). We describe how the attack leads to VM leakage, causing orphaned VMs to accumulate over time, reducing the pool of resources available to users. We identify a set of orphan control processes needed in multiple cloud components, and we illustrate how such processes detect and eliminate orphaned VMs. We show that adding orphan control allows an open-source cloud to sustain a higher level of VM availability during malicious attacks. We also report on the overhead of implementing orphan control.
Keywords
cloud computing; security of data; virtual machines; VM leakage; cloud computing systems; computer systems; malicious attack; open-source clouds; open-source code; orphan control; resource exhaustion; resource leakage; virtual machines; Availability; Cloud computing; Open source software; Process control; Resource management; System performance; availability; cloud computing; modeling; reliability; scalable fault resilience techniques;
fLanguage
English
Publisher
ieee
Conference_Titel
Cloud Computing Technology and Science (CloudCom), 2011 IEEE Third International Conference on
Conference_Location
Athens
Print_ISBN
978-1-4673-0090-2
Type
conf
DOI
10.1109/CloudCom.2011.84
Filename
6133193
Link To Document