A Survey of Virtualization Techniques Focusing on Secure On-Demand Cluster Computing

Virtualization, a technique once used to multiplex the resources of high-priced mainframe hardware, is seeing a resurgence in applicability with the increasing computing power of commodity computers. By inserting a layer of software between the machine and traditional operating systems, this technology allows access to a shared computing medium in a manner that is secure, resource-controlled, and efficient. These properties are attractive in the field of on-demand computing, where the fine-grained subdivision of resources provided by virtualized systems allows potentially higher utilization of computing resources. It this work, we survey a number of virtual machine systems with the goal of finding an appropriate candidate to serve as the basis for the On-Demand Secure Cluster Computing project at the National Center for Supercomputing Applications. Contenders are reviewed on a number of desirable properties including portability and security. We conclude with a comparison and justification of our choice.

[1]  Laxmikant V. Kale,et al.  Faucets: efficient resource allocation on the computational grid , 2004 .

[2]  Ian T. Foster,et al.  The anatomy of the grid: enabling scalable virtual organizations , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.

[3]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[4]  Scott Devine,et al.  Disco: running commodity operating systems on scalable multiprocessors , 1997, TOCS.

[5]  Laxmikant V. Kalé,et al.  Faucets: efficient resource allocation on the computational grid , 2004, International Conference on Parallel Processing, 2004. ICPP 2004..

[6]  Steven Tuecke,et al.  The Physiology of the Grid An Open Grid Services Architecture for Distributed Systems Integration , 2002 .

[7]  Dawson R. Engler,et al.  Exokernel: an operating system architecture for application-level resource management , 1995, SOSP.

[8]  Laxmikant V. Kalé,et al.  Adaptive MPI , 2003, LCPC.

[9]  Laxmikant V. Kalé,et al.  CHARM++: a portable concurrent object oriented system based on C++ , 1993, OOPSLA '93.

[10]  Beng-Hong Lim,et al.  Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor , 2001, USENIX Annual Technical Conference, General Track.

[11]  Gregory A. Koenig,et al.  Design of an Economics-Based Software Infrastructure for Secure Utility Computing on Supercomputing Clusters , 2004 .

[12]  Gregory A. Koenig,et al.  Using message-driven objects to mask latency in grid computing applications , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[13]  Steven Hand,et al.  PDB: pervasive debugging with Xen , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[14]  WhitakerAndrew,et al.  Rethinking the Design of Virtual Machine Monitors , 2005 .

[15]  Willy Zwaenepoel,et al.  Diagnosing performance overheads in the xen virtual machine environment , 2005, VEE '05.

[16]  James E. Smith,et al.  The architecture of virtual machines , 2005, Computer.

[17]  Gerald J. Popek,et al.  Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.

[18]  Samuel T. King,et al.  ReVirt: enabling intrusion analysis through virtual-machine logging and replay , 2002, OPSR.

[19]  K. F. Seiden,et al.  The auditing facility for a VMM security kernel , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[20]  Love H. Seawright,et al.  VM/370 - A Study of Multiplicity and Usefulness , 1979, IBM Syst. J..

[21]  R. Sailer,et al.  sHype : Secure Hypervisor Approach to Trusted Virtualized Systems , 2005 .

[22]  Mendel Rosenblum,et al.  Cellular disco: resource management using virtual clusters on shared-memory multiprocessors , 2000, TOCS.

[23]  David E. Culler,et al.  PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.

[24]  Renato J. O. Figueiredo,et al.  A case for grid computing on virtual machines , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[25]  James E. Smith,et al.  Virtual machines - versatile platforms for systems and processes , 2005 .

[26]  Thiemo Voigt,et al.  SILK: Scout Paths in the Linux Kernel , 2001 .

[27]  Robert J. Creasy,et al.  The Origin of the VM/370 Time-Sharing System , 1981, IBM J. Res. Dev..

[28]  Carl A. Waldspurger,et al.  Memory resource management in VMware ESX server , 2002, OSDI '02.

[29]  Marianne Shaw,et al.  Scale and performance in the Denali isolation kernel , 2002, OSDI '02.

[30]  Marianne Shaw,et al.  Rethinking the design of virtual machine monitors , 2005, Computer.