Evaluating survivability and costs of three virtual machine based server architectures

Meng Yu, Alex Hai Wang, Wanyu Zang, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

Virtual machine based services are becoming predominant in data centers or cloud computing since virtual machines can provide strong isolation and better monitoring for security purposes. While there are many promising security techniques based on virtual machines, it is not clear how significant the difference between various system architectures can be in term of survivability. In this paper, we analyze the survivability of three virtual machine based architectures -load balancing architecture, isolated service architecture, and BFT architecture. Both the survivability based on the availability and the survivability under sustained attacks for each architecture are analyzed. Furthermore, the costs of each architecture are compared. The results show that even if the same set of commercial off the shell (COTS) software are used, the performance of various service architectures are largely different in surviving attacks. Our results can be used as guidelines in the service architecture design when survivability to attacks is important.

Original languageEnglish (US)
Title of host publicationSECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography
Pages478-485
Number of pages8
StatePublished - Dec 1 2010
EventInternational Conference on Security and Cryptography, SECRYPT 2010 - Athens, Greece
Duration: Jul 26 2010Jul 28 2010

Publication series

NameSECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography

Other

OtherInternational Conference on Security and Cryptography, SECRYPT 2010
CountryGreece
CityAthens
Period7/26/107/28/10

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Science Applications

Fingerprint Dive into the research topics of 'Evaluating survivability and costs of three virtual machine based server architectures'. Together they form a unique fingerprint.

  • Cite this

    Yu, M., Wang, A. H., Zang, W., & Liu, P. (2010). Evaluating survivability and costs of three virtual machine based server architectures. In SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography (pp. 478-485). (SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography).