dependable cloud computing
play

Dependable Cloud Computing: Virtualization-Based Management for - PowerPoint PPT Presentation

Dependable Cloud Computing: Virtualization-Based Management for Servers, Clients and Network Kazuhiko Kato University of Tsukuba Japan NSC-JST Workshop Nov. 27, 2012 Project Members University of Tsukuba Kazuhiko Kato, Akiyoshi Sugiki,


  1. Dependable Cloud Computing: Virtualization-Based Management for Servers, Clients and Network Kazuhiko Kato University of Tsukuba Japan NSC-JST Workshop Nov. 27, 2012

  2. Project Members University of Tsukuba Kazuhiko Kato, Akiyoshi Sugiki, Koji Hasebe Yasushi Shinjyo University of Tokyo Takahiro Shinaga ( Previously, University of Tsukuba) University of Electro-Communications Yoshihiro Oyama Fujisoft Inc. Yoshiaki Ishii, Kyohei Yano, Seiji Hirooka 2

  3. Failure Guest OS BitVisor Hardware Servers (in several data centers) Network Clients Internet Overview of Dependable Cloud computing Developing infrastructural software for cloud computing with servers, client, and network. Dependability : Reliability, Availability, Response, Throughput, Security, Privacy 3

  4. 4 Failure Guest OS BitVisor Hardware Servers (in several data centers) Network Clients Internet (I) Dependable Server Management

  5. Kumoi (雲居) : Middleware for Cloud Server Management • Riding on the Scala programming language ✓ OO & functional ✓ "Scalable" coding (Java-to-Ruby level) with static type system • Object/Resource mapping for data centers ✓ Real/virtual machines and network are mapped to HW/SW objs. (Cf. O/R mapping in db software) • Incorporated distributed algorithms such as gossip algorithms and Paxos. • Available as open source software. 5

  6. Kumoi Overview Manager/operator Data center Kumoi kernel VM Disk Interactive/batch VMM VNet Method Kumoi shell call Real Network Scala machine Result 34K lines of Scala source code 6

  7. Kumoi Scripting (Cf. Unix scripting) scala> pms.fliter(_.cpuRatio > 0.9).map(_.name) pms: List of available physical machines _: Formal arguments for higher-order function 7

  8. Kumoi System Programming: VM-Compaction def compact(pms: List[VM]) { def firstFit(v: VM, rest: List[VM]) { rest match { case h :: rs if (h.cpuAvailable > v.cpuRatio) => v.migrateTo(h) case h :: rs => firstFit(v, rs) case List() => } } def compacti(pms: List[VM]) { pms match { case h :: rest => h.vms.foreach(v => firstFit(v, rest.reverse)) compacti(rest) case List() => } } compacti(pms.reverse) } 8

  9. 9 Failure Guest OS BitVisor Hardware Servers (in several data centers) Network Clients Internet (II) Dependable Client Management

  10. 10 仮想マシン (VM: Virtual Machine) 仮想マシン (VM: Virtual Machine) Virtual Machine Monitor Virtual Machine Guest OS Physical Machine OS Virtual Machine Monitor Hardware Hardware

  11. BitVisor: Secure VMM • Storage management ��������� ✓ Encrypting HDD, USB memory • Network management ���� ✓ VPN (IPsec) ������������� �������� ������������� ��������� ����������� ���� • ID Management ��������������� ✓ Key management/authentication ��������� ������������������������������������� with IC card • VMM Core ��������� ✓ Virtualization of CPU and memory 11

  12. Utilization of BitVisor • System file protection of guest OS • Malware detection ✓ IDS within VMM • Transparent VPN switching (described in the next topic) 12

  13. • Integrity (code cannot be modified undetectably) ✓Kernel image ✓Device driver ✓etc. System File Protection of Guest OS

  14. Implementation of System File Protection • BitVisor monitors every storage Guest&OS access. Device&driver VM ATA NIC USB ✓ Detects system file VMM modification. Extended&function • Mapping between files and Device&mediator sectors are managed. Protection&policy Device Hardware ATA NIC USB

  15. Malware detection IDS within VMM ��������� � �������������� � Run$at$the$boot$ +me$of$BitVisor � ��������� data$block$ � � ���������� � ���������� � ���������� ���������� � � � ���������������� ���������� ��������� � � �������������� ����������� ������� � ���������������� � ������� ���� � � � � � � data$block$ � ���������

  16. BitVisor as Research Platform • HyperSafe [Wang et al., IEEE S&P ‘10] ✓ Integrity of hypervisor itself, i.e., modification disabled. • “Return-less” VMM [Li et al., EuroSys ‘10] ✓ Against ROR (Return-Oriented Rootkit) • TCVisor [Rezaei et al., ICITST ‘10] ✓ Limited storage area can be seen by each user. 16

  17. 17

  18. 18 Failure Guest OS BitVisor Hardware Servers (in several data centers) Network Clients Internet (III) Dependable Network

  19. Failure Detection in VMM ���� ����������������� ����� ������� ���������������� ������� ����������� �� � � � � � � � ������� � � ��� ��������� �������������� ��� �������� ������ ��

  20. VPN Switching in VMM ���� ����������������� ����� ������� ���������������� ������� ����������� �� � � � � � � � ������� � � ��� ��������� �������������� ��� �������� ������ ��

  21. つくば 21 Experiments with Real Data Center ������������ Fujisoft in Yokohama Fujisoft in Kyusyu ��������������������� ������� �������� ������������ ����� ������ Fujisoft in Kyusyu Tsukuba ���������

  22. Failure occurred point 19.2 15.1 Failure recovered point VPN Switching Before: Tsukuba-Tokyo (56Km) After: Tsukuba-Yokohama (84Km) ad- opera- VPN throughput [Mbit/sec] 10 8 et 6 4 2 0 0 5 10 15 20 25 30 Elapsed time [sec] guest Figure 8. Throughput Transition over Failure 22

  23. Tsukuba-Fukuoka (926Km) Newtork Latency and Throughput of VPN Switching Tsukuba-Tokyo (56Km) Tsukuba-Yokohama (84Km) 70 35 Bandwidth [Mbit/sec] 60 30 Latency [msec] 50 25 20 40 15 30 10 20 5 10 0 0 Tokyo Yokohama Fukuoka Tokyo Yokohama Fukuoka VPN on OS VPN on OS 58.88 52.98 26.43 13.18 12.63 32.04 VPN on VMM VPN on VMM 13.46 13.00 32.57 49.31 47.45 25.27 VPN on VMM with relay VPN on VMM with relay 13.71 13.23 32.80 41.22 41.94 24.45 Figure 10. Throughput Figure 9. Latency 23

  24. Summary Dependable cloud computing environment for servers, client and network, by using virtualization technologies. 24 Failure Guest OS BitVisor Hardware Servers (in several data centers) Network Clients Internet

  25. Ongoing Work • Extension and application of Kumoi ✓ Virtual network control with OpenFlow ✓ Failure-oblivious computing ✓ Application: Parallel, distributed parameter tuning • BitVisor application ✓ Transparent network boot system ✓ Acceleration of guest OS boot ✓ Desktop grid with intra-VMM computation • Energy-saving distributed storage system 25

Recommend


More recommend