TY - GEN
T1 - Evaluating survivability and costs of three virtual machine based server architectures
AU - Yu, Meng
AU - Wang, Alex Hai
AU - Zang, Wanyu
AU - Liu, Peng
PY - 2010
Y1 - 2010
N2 - Virtual machine based services are becoming predominant in data centers or cloud computing since virtual machines can provide strong isolation and better monitoring for security purposes. While there are many promising security techniques based on virtual machines, it is not clear how significant the difference between various system architectures can be in term of survivability. In this paper, we analyze the survivability of three virtual machine based architectures -load balancing architecture, isolated service architecture, and BFT architecture. Both the survivability based on the availability and the survivability under sustained attacks for each architecture are analyzed. Furthermore, the costs of each architecture are compared. The results show that even if the same set of commercial off the shell (COTS) software are used, the performance of various service architectures are largely different in surviving attacks. Our results can be used as guidelines in the service architecture design when survivability to attacks is important.
AB - Virtual machine based services are becoming predominant in data centers or cloud computing since virtual machines can provide strong isolation and better monitoring for security purposes. While there are many promising security techniques based on virtual machines, it is not clear how significant the difference between various system architectures can be in term of survivability. In this paper, we analyze the survivability of three virtual machine based architectures -load balancing architecture, isolated service architecture, and BFT architecture. Both the survivability based on the availability and the survivability under sustained attacks for each architecture are analyzed. Furthermore, the costs of each architecture are compared. The results show that even if the same set of commercial off the shell (COTS) software are used, the performance of various service architectures are largely different in surviving attacks. Our results can be used as guidelines in the service architecture design when survivability to attacks is important.
UR - http://www.scopus.com/inward/record.url?scp=78651459732&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78651459732&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:78651459732
SN - 9789898425188
T3 - SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography
SP - 478
EP - 485
BT - SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography
T2 - International Conference on Security and Cryptography, SECRYPT 2010
Y2 - 26 July 2010 through 28 July 2010
ER -