Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CLOUD.2013.28guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An Application-Level Approach for Privacy-Preserving Virtual Machine Checkpointing

Published: 28 June 2013 Publication History

Abstract

Virtualization has been widely adopted in recent years in the cloud computing platform to improve server consolidation and reduce operating cost. Virtual Machine (VM) checkpointing refers to the act of saving a persistent snapshot (or checkpoint) of a VM's state at any instant. VM checkpointing can drastically prolong the lifetime and vulnerability of confidential or private user data in applications that execute within VMs. Simply encrypting the checkpoint does not reduce the lifetime of confidential data that should be quickly discarded after its use. In this paper, we present an application-level approach, called Privacy-preserving Checkpointing (PPC), which excludes confidential data from VM checkpoints, instead of encrypting such data. PPC enables an application programmer to register memory locations that represent the origins of confidential data. During the VM's execution, PPC performs information flow analysis to automatically track the propagation of confidential data through the application and various components of the VM, including the guest operating system. During VM checkpointing, the locations identified during the information flow analysis are excluded from the persistent checkpoint. We present the design and implementation of the PPC system in VirtualBox VMs running the commodity Linux operating system. We demonstrate the use of our system using the vim and gedit text editors. We also show that PPC introduces acceptable performance overhead.

Cited By

View all
  • (2015)Privacy-preserving Virtual MachineProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2818044(231-240)Online publication date: 7-Dec-2015
  • (2015)Security in cloud computingInformation Sciences: an International Journal10.1016/j.ins.2015.01.025305:C(357-383)Online publication date: 1-Jun-2015

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CLOUD '13: Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing
June 2013
982 pages
ISBN:9780769550282

Publisher

IEEE Computer Society

United States

Publication History

Published: 28 June 2013

Author Tags

  1. Privacy
  2. Virtual Machine Checkpointing

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2015)Privacy-preserving Virtual MachineProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2818044(231-240)Online publication date: 7-Dec-2015
  • (2015)Security in cloud computingInformation Sciences: an International Journal10.1016/j.ins.2015.01.025305:C(357-383)Online publication date: 1-Jun-2015

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media