SlideShare a Scribd company logo
1 of 18
Virtualization and Cloud
Computing
Definition
• Virtualization is the ability to run multiple
operating systems on a single physical system and
share the underlying hardware resources*
• It is the process by which one computer hosts the
appearance of many computers.
• Virtualization is used to improve IT throughput
and costs by using physical resources as a pool
from which virtual resources can be allocated.
*VMWare white paper, Virtualization Overview
Virtualization Architecture
•A Virtual machine (VM) is an isolated runtime
environment (guest OS and applications)
•Multiple virtual systems (VMs) can run on a single
physical system
Hypervisor
• A hypervisor, a.k.a. a virtual machine
manager/monitor (VMM), or virtualization
manager, is a program that allows multiple
operating systems to share a single hardware
host.
• Each guest operating system appears to have the
host's processor, memory, and other resources all
to itself. However, the hypervisor is actually
controlling the host processor and resources,
allocating what is needed to each operating
system in turn and making sure that the guest
operating systems (called virtual machines)
cannot disrupt each other.
Benefits of Virtualization
• Sharing of resources helps cost reduction
• Isolation: Virtual machines are isolated from
each other as if they are physically separated
• Encapsulation: Virtual machines encapsulate a
complete computing environment
• Hardware Independence: Virtual machines
run independently of underlying hardware
• Portability: Virtual machines can be migrated
between different hosts.
Virtualization in Cloud Computing
Cloud computing takes virtualization one step
further:
• You don’t need to own the hardware
• Resources are rented as needed from a cloud
• Various providers allow creating virtual servers:
– Choose the OS and software each instance will have
– The chosen OS will run on a large server farm
– Can instantiate more virtual servers or shut down
existing ones within minutes
• You get billed only for what you used
Virtualization Security Challenges
The trusted computing base (TCB) of a virtual
machine is too large.
• TCB: A small amount of software and hardware
that security depends on and that we distinguish
from a much larger amount that can misbehave
without affecting security*
• Smaller TCB  more security
*Lampson et al., “Authentication in distributed systems: Theory
and practice,” ACM TCS 1992
Xen Virtualization Architecture and
the Threat Model
• Management VM – Dom0
• Guest VM – Dom
• Dom0 may be malicious
– Vulnerabilities
– Device drivers
– Careless/malicious
administration
• Dom0 is in the TCB of DomU because it can access the
memory of DomU, which may cause information
leakage/modification
Virtualization Security Requirements
• Scenario: A client uses the service of a cloud
computing company to build a remote VM
– A secure network interface
– A secure secondary storage
– A secure run-time environment
• Build, save, restore, destroy
Virtualization Security Requirements
• A secure run-time environment is the most fundamental
– The first two problems already have solutions:
• Network interface: Transport layer security (TLS)
• Secondary storage: Network file system (NFS)
– The security mechanism in the first two rely on a
secure run-time environment
• All the cryptographic algorithms and security
protocols reside in the run-time environment
Smaller TCB Solution
Smaller TCB
Actual TCB
*Secure Virtual Machine Execution under an Untrusted Management OS. C. Li, A.
Raghunathan, N.K. Jha. IEEE CLOUD, 2010.
Domain building
• Building process
Domain save/restore
Hypervisor Vulnerabilities
Malicious software can run on the same server:
– Attack hypervisor
– Access/Obstruct other VMs
14
Physical Hardware
Hypervisor
OS OS
Apps Apps
Guest VM1 Guest VM2
servers
NoHype*
• NoHype removes the hypervisor
– There’s nothing to attack
– Complete systems solution
– Still retains the needs of a virtualized cloud
infrastructure
15
Physical Hardware
OS OS
Apps Apps
Guest VM1 Guest VM2
No hypervisor
*NoHype: Virtualized Cloud Infrastructure without the Virtualization. E. Keller, J. Szefer, J.
Rexford, R. Lee. ISCA 2010.
Roles of the Hypervisor
• Isolating/Emulating resources
– CPU: Scheduling virtual machines
– Memory: Managing memory
– I/O: Emulating I/O devices
• Networking
• Managing virtual machines
Push to HW /
Pre-allocation
Remove
Push to side
Removing the Hypervisor
• Scheduling virtual machines
– One VM per core
• Managing memory
– Pre-allocate memory with processor support
• Emulating I/O devices
– Direct access to virtualized devices
• Networking
– Utilize hardware Ethernet switches
• Managing virtual machines
– Decouple the management from operation
References
• http://www.vmware.com/pdf/virtualization.pdf
• NoHype: Virtualized Cloud Infrastructure
without the Virtualization. E. Keller, J. Szefer, J.
Rexford, R. Lee. ISCA 2010.
• Secure Virtual Machine Execution under an
Untrusted Management OS. C. Li, A.
Raghunathan, N.K. Jha. IEEE CLOUD, 2010.
• An Introduction to Virtualization and Cloud
Technologies to Support Grid Computing. I.M.
Lorente. EGEE08.

More Related Content

Similar to virtualization(1).pptx

lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxAnilkumarbehera16
 
6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptxAnsarHasas1
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatinRaj Sarode
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdfErvisTema1
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravym456
 
Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)kamrankausar
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualizationwebhostingguy
 
Virtualization
VirtualizationVirtualization
VirtualizationMadnanS
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualizationAyaz Shahid
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization iParth Patel
 

Similar to virtualization(1).pptx (20)

Virtual machine
Virtual machineVirtual machine
Virtual machine
 
lecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptxlecture5-virtualization-190301171613.pptx
lecture5-virtualization-190301171613.pptx
 
6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx6-Virtualizaiton-6.pptx
6-Virtualizaiton-6.pptx
 
virtual machine.ppt
virtual machine.pptvirtual machine.ppt
virtual machine.ppt
 
Unit 2
Unit 2Unit 2
Unit 2
 
Slide final
Slide finalSlide final
Slide final
 
Parth virt
Parth virtParth virt
Parth virt
 
Chap 2 virtulizatin
Chap 2 virtulizatinChap 2 virtulizatin
Chap 2 virtulizatin
 
Virtualization in cloud computing
Virtualization in cloud computingVirtualization in cloud computing
Virtualization in cloud computing
 
1 (3).pptx
1 (3).pptx1 (3).pptx
1 (3).pptx
 
9-cloud-computing.pdf
9-cloud-computing.pdf9-cloud-computing.pdf
9-cloud-computing.pdf
 
Virtualizaiton-3.pptx
Virtualizaiton-3.pptxVirtualizaiton-3.pptx
Virtualizaiton-3.pptx
 
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptxaravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
aravind_kmdfdgmfmfmmfmkmkmmgmbmgmbmgbmgmkm.pptx
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)Dynamic Load balancing Linux private Cloud (DRS)
Dynamic Load balancing Linux private Cloud (DRS)
 
Server Virtualization
Server VirtualizationServer Virtualization
Server Virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Introductin to virtualization i
Introductin to virtualization   iIntroductin to virtualization   i
Introductin to virtualization i
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

virtualization(1).pptx

  • 2. Definition • Virtualization is the ability to run multiple operating systems on a single physical system and share the underlying hardware resources* • It is the process by which one computer hosts the appearance of many computers. • Virtualization is used to improve IT throughput and costs by using physical resources as a pool from which virtual resources can be allocated. *VMWare white paper, Virtualization Overview
  • 3. Virtualization Architecture •A Virtual machine (VM) is an isolated runtime environment (guest OS and applications) •Multiple virtual systems (VMs) can run on a single physical system
  • 4. Hypervisor • A hypervisor, a.k.a. a virtual machine manager/monitor (VMM), or virtualization manager, is a program that allows multiple operating systems to share a single hardware host. • Each guest operating system appears to have the host's processor, memory, and other resources all to itself. However, the hypervisor is actually controlling the host processor and resources, allocating what is needed to each operating system in turn and making sure that the guest operating systems (called virtual machines) cannot disrupt each other.
  • 5. Benefits of Virtualization • Sharing of resources helps cost reduction • Isolation: Virtual machines are isolated from each other as if they are physically separated • Encapsulation: Virtual machines encapsulate a complete computing environment • Hardware Independence: Virtual machines run independently of underlying hardware • Portability: Virtual machines can be migrated between different hosts.
  • 6. Virtualization in Cloud Computing Cloud computing takes virtualization one step further: • You don’t need to own the hardware • Resources are rented as needed from a cloud • Various providers allow creating virtual servers: – Choose the OS and software each instance will have – The chosen OS will run on a large server farm – Can instantiate more virtual servers or shut down existing ones within minutes • You get billed only for what you used
  • 7. Virtualization Security Challenges The trusted computing base (TCB) of a virtual machine is too large. • TCB: A small amount of software and hardware that security depends on and that we distinguish from a much larger amount that can misbehave without affecting security* • Smaller TCB  more security *Lampson et al., “Authentication in distributed systems: Theory and practice,” ACM TCS 1992
  • 8. Xen Virtualization Architecture and the Threat Model • Management VM – Dom0 • Guest VM – Dom • Dom0 may be malicious – Vulnerabilities – Device drivers – Careless/malicious administration • Dom0 is in the TCB of DomU because it can access the memory of DomU, which may cause information leakage/modification
  • 9. Virtualization Security Requirements • Scenario: A client uses the service of a cloud computing company to build a remote VM – A secure network interface – A secure secondary storage – A secure run-time environment • Build, save, restore, destroy
  • 10. Virtualization Security Requirements • A secure run-time environment is the most fundamental – The first two problems already have solutions: • Network interface: Transport layer security (TLS) • Secondary storage: Network file system (NFS) – The security mechanism in the first two rely on a secure run-time environment • All the cryptographic algorithms and security protocols reside in the run-time environment
  • 11. Smaller TCB Solution Smaller TCB Actual TCB *Secure Virtual Machine Execution under an Untrusted Management OS. C. Li, A. Raghunathan, N.K. Jha. IEEE CLOUD, 2010.
  • 14. Hypervisor Vulnerabilities Malicious software can run on the same server: – Attack hypervisor – Access/Obstruct other VMs 14 Physical Hardware Hypervisor OS OS Apps Apps Guest VM1 Guest VM2 servers
  • 15. NoHype* • NoHype removes the hypervisor – There’s nothing to attack – Complete systems solution – Still retains the needs of a virtualized cloud infrastructure 15 Physical Hardware OS OS Apps Apps Guest VM1 Guest VM2 No hypervisor *NoHype: Virtualized Cloud Infrastructure without the Virtualization. E. Keller, J. Szefer, J. Rexford, R. Lee. ISCA 2010.
  • 16. Roles of the Hypervisor • Isolating/Emulating resources – CPU: Scheduling virtual machines – Memory: Managing memory – I/O: Emulating I/O devices • Networking • Managing virtual machines Push to HW / Pre-allocation Remove Push to side
  • 17. Removing the Hypervisor • Scheduling virtual machines – One VM per core • Managing memory – Pre-allocate memory with processor support • Emulating I/O devices – Direct access to virtualized devices • Networking – Utilize hardware Ethernet switches • Managing virtual machines – Decouple the management from operation
  • 18. References • http://www.vmware.com/pdf/virtualization.pdf • NoHype: Virtualized Cloud Infrastructure without the Virtualization. E. Keller, J. Szefer, J. Rexford, R. Lee. ISCA 2010. • Secure Virtual Machine Execution under an Untrusted Management OS. C. Li, A. Raghunathan, N.K. Jha. IEEE CLOUD, 2010. • An Introduction to Virtualization and Cloud Technologies to Support Grid Computing. I.M. Lorente. EGEE08.