Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Characterizing and Mitigating Virtua...
~
Xu, Yunjing.
Linked to FindBook
Google Book
Amazon
博客來
Characterizing and Mitigating Virtual Machine Interference in Public Clouds.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Characterizing and Mitigating Virtual Machine Interference in Public Clouds./
Author:
Xu, Yunjing.
Description:
137 p.
Notes:
Source: Dissertation Abstracts International, Volume: 75-10(E), Section: B.
Contained By:
Dissertation Abstracts International75-10B(E).
Subject:
Computer Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3624754
ISBN:
9781303987526
Characterizing and Mitigating Virtual Machine Interference in Public Clouds.
Xu, Yunjing.
Characterizing and Mitigating Virtual Machine Interference in Public Clouds.
- 137 p.
Source: Dissertation Abstracts International, Volume: 75-10(E), Section: B.
Thesis (Ph.D.)--University of Michigan, 2014.
This item must not be sold to any third party vendors.
This dissertation studies the mitigation of the performance and security interference between guest virtual machines (VMs) in public clouds. The goals are to characterize the impact of VM interference, uncover the root cause of the negative impact, and design novel techniques to mitigate such impact. The central premise of this dissertation is that by identifying the shared resources that cause the VM interference and by exploiting the properties of the workloads that share these resources with adapted scheduling policies, public cloud services can reduce conflicts of resource usage between guests and hence mitigate their interference. Current techniques for conflict reduction and interference mitigation overlook the virtualization semantic gap between the cloud host infrastructure and guest virtual machines and the unique challenges posed by the multi-tenancy service model necessary to support public cloud services.
ISBN: 9781303987526Subjects--Topical Terms:
626642
Computer Science.
Characterizing and Mitigating Virtual Machine Interference in Public Clouds.
LDR
:02947nmm a2200313 4500
001
2056377
005
20150526083644.5
008
170521s2014 ||||||||||||||||| ||eng d
020
$a
9781303987526
035
$a
(MiAaPQ)AAI3624754
035
$a
AAI3624754
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Xu, Yunjing.
$3
3170131
245
1 0
$a
Characterizing and Mitigating Virtual Machine Interference in Public Clouds.
300
$a
137 p.
500
$a
Source: Dissertation Abstracts International, Volume: 75-10(E), Section: B.
500
$a
Advisers: Michael D. Bailey; Farnam Jahanian.
502
$a
Thesis (Ph.D.)--University of Michigan, 2014.
506
$a
This item must not be sold to any third party vendors.
520
$a
This dissertation studies the mitigation of the performance and security interference between guest virtual machines (VMs) in public clouds. The goals are to characterize the impact of VM interference, uncover the root cause of the negative impact, and design novel techniques to mitigate such impact. The central premise of this dissertation is that by identifying the shared resources that cause the VM interference and by exploiting the properties of the workloads that share these resources with adapted scheduling policies, public cloud services can reduce conflicts of resource usage between guests and hence mitigate their interference. Current techniques for conflict reduction and interference mitigation overlook the virtualization semantic gap between the cloud host infrastructure and guest virtual machines and the unique challenges posed by the multi-tenancy service model necessary to support public cloud services.
520
$a
This dissertation deals with both performance and security interference problems. It characterizes the impact of VM interference on inter-VM network latency using live measurements in a real public cloud and studies the root cause of the negative impact with controlled experiments on a local testbed. Two methods of improving the inter-VM net- work latency are explored. The first approach is a guest-centric solution that exploits the properties of application workloads to avoid interference without any support from the underlying host infrastructure. The second approach is a host-centric solution that adapts the scheduling policies for the contented resources that cause the interference without guest cooperation. Similarly, the characteristics of cache-based cross-VM attacks are studied in detail using both live cloud measurements and testbed experiments. To mitigate this security interference, a partition-based VM scheduling system is designed to reduce the effectiveness of these cache-based attacks.
590
$a
School code: 0127.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Engineering, General.
$3
1020744
690
$a
0984
690
$a
0464
690
$a
0537
710
2
$a
University of Michigan.
$b
Computer Science and Engineering.
$3
2095970
773
0
$t
Dissertation Abstracts International
$g
75-10B(E).
790
$a
0127
791
$a
Ph.D.
792
$a
2014
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3624754
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9288866
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login