{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:35:50Z","timestamp":1750307750899,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2008,1]]},"abstract":"<jats:p>\n            Virtual machine (VM) time travel enables reverting a virtual machine's state, both transient and persistent, to past points in time. This capability can be used to improve virtual machine availability, to enable forensics on past VM states, and to recover from operator errors. We present an approach to virtual machine time travel which combines Continuous Data Protection (CDP) storage support with live-migration-based virtual machine checkpointing. In particular, we present a novel approach for CDP which enables efficient reverts of the storage state to past points in time and makes it possible to\n            <jats:italic>undo<\/jats:italic>\n            a revert, and this is achieved using a simple branched-temporal data structure. We also present a design and implementation of a simple live-migration-based checkpointing mechanism in Xen.\n          <\/jats:p>","DOI":"10.1145\/1341312.1341341","type":"journal-article","created":{"date-parts":[[2008,2,8]],"date-time":"2008-02-08T15:32:16Z","timestamp":1202484736000},"page":"127-134","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Virtual machine time travel using continuous data protection and checkpointing"],"prefix":"10.1145","volume":"42","author":[{"given":"Paula","family":"Ta-Shma","sequence":"first","affiliation":[{"name":"IBM Haifa Research Lab"}]},{"given":"Guy","family":"Laden","sequence":"additional","affiliation":[{"name":"IBM Haifa Research Lab"}]},{"given":"Muli","family":"Ben-Yehuda","sequence":"additional","affiliation":[{"name":"IBM Haifa Research Lab"}]},{"given":"Michael","family":"Factor","sequence":"additional","affiliation":[{"name":"IBM Haifa Research Lab"}]}],"member":"320","published-online":{"date-parts":[[2008,1]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"ZFS\n  : The last word in file systems. http:\/\/www.sun.com\/2004-0914\/feature\/.  ZFS: The last word in file systems. http:\/\/www.sun.com\/2004-0914\/feature\/."},{"key":"e_1_2_1_2_1","first-page":"259","volume-title":"Proceedings of the 10th NASA Goddard and 19th IEEE Symposium Conference on Mass Storage Systems and Technologies (MSST'02)","author":"Azagury A.","year":"2002","unstructured":"A. Azagury , M. E. Factor , J. Satran , and W. Micka . Point-in-Time Copy: Yesterday, Today and Tomorrow . In Proceedings of the 10th NASA Goddard and 19th IEEE Symposium Conference on Mass Storage Systems and Technologies (MSST'02) , pages 259 -- 270 , April 2002 . A. Azagury, M. E. Factor, J. Satran, and W. Micka. Point-in-Time Copy: Yesterday, Today and Tomorrow. In Proceedings of the 10th NASA Goddard and 19th IEEE Symposium Conference on Mass Storage Systems and Technologies (MSST'02), pages 259--270, April 2002."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945462"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00288683"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of USENIX Annual Technical Conference","author":"Brown A.","year":"2003","unstructured":"A. Brown and D. A. Patterson . Undo for Operators: Building an undoable E-mail store . In Proceedings of USENIX Annual Technical Conference , San Antonio, TX , June 2003 . A. Brown and D. A. Patterson. Undo for Operators: Building an undoable E-mail store. In Proceedings of USENIX Annual Technical Conference, San Antonio, TX, June 2003."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251203.1251223"},{"key":"e_1_2_1_7_1","volume-title":"Virtual machine checkpointing. Xen Summit","author":"Cully B.","year":"2007","unstructured":"B. Cully . Virtual machine checkpointing. Xen Summit 2007 . http:\/\/www.xensource.com\/files\/xensummit 4\/talk_Cully.pdf. B. Cully. Virtual machine checkpointing. Xen Summit 2007. http:\/\/www.xensource.com\/files\/xensummit 4\/talk_Cully.pdf."},{"key":"e_1_2_1_8_1","first-page":"12","volume-title":"Proceedings of the 2nd conference on Hot Topics in System Dependability (HOTDEP'06)","author":"Cully B.","year":"2006","unstructured":"B. Cully and A. Warfield . Secondsite: disaster protection for the common server . In Proceedings of the 2nd conference on Hot Topics in System Dependability (HOTDEP'06) , pages 12 -- 12 , Berkeley, CA, USA , 2006 . USENIX Association. B. Cully and A. Warfield. Secondsite: disaster protection for the common server. In Proceedings of the 2nd conference on Hot Topics in System Dependability (HOTDEP'06), pages 12--12, Berkeley, CA, USA, 2006. USENIX Association."},{"key":"e_1_2_1_9_1","first-page":"33","article-title":"Continuous protection","author":"Damoulakis J.","year":"2004","unstructured":"J. Damoulakis . Continuous protection . Storage , June 2004 , 3(4): 33 -- 39 , 2004. J. Damoulakis. Continuous protection. Storage, June 2004, 3(4):33--39, 2004.","journal-title":"Storage"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the 2000 Linux Showcase and Conference","author":"Dike J.","year":"2000","unstructured":"J. Dike . A user-mode port of the linux kernel . In Proceedings of the 2000 Linux Showcase and Conference , 2000 . J. Dike. A user-mode port of the linux kernel. In Proceedings of the 2000 Linux Showcase and Conference, 2000."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133616"},{"key":"e_1_2_1_12_1","first-page":"235","volume-title":"Proceedings of the Winter'94 USENIX Technical Conference","author":"Hitz D.","year":"1994","unstructured":"D. Hitz , J. Lau , and M. A. Malcolm . File system design for an NFS file server appliance . In Proceedings of the Winter'94 USENIX Technical Conference , pages 235 -- 246 , 1994 . D. Hitz, J. Lau, and M. A. Malcolm. File system design for an NFS file server appliance. In Proceedings of the Winter'94 USENIX Technical Conference, pages 235--246, 1994."},{"key":"e_1_2_1_13_1","first-page":"451","volume-title":"Proceedings of 26th International Conference on Very Large Data Bases (VLDB 2000","author":"Jiang L.","year":"2000","unstructured":"L. Jiang , B. Salzberg , D. B. Lomet , and M. Barrena . The BT-tree: A Branched and Temporal Access Method . In Proceedings of 26th International Conference on Very Large Data Bases (VLDB 2000 ), September 10 --14 , 2000 , Cairo, Egypt, pages 451 -- 460 . Morgan Kaufmann, 2000. L. Jiang, B. Salzberg, D. B. Lomet, and M. Barrena. The BT-tree: A Branched and Temporal Access Method. In Proceedings of 26th International Conference on Very Large Data Bases (VLDB 2000), September 10--14, 2000, Cairo, Egypt, pages 451--460. Morgan Kaufmann, 2000."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247361"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2004.67"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267903.1267924"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1063786.1063789"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/319806.319816"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.157"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319159"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060324"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/323647.323632"},{"issue":"3","key":"e_1_2_1_24_1","first-page":"21","article-title":"A Retrospective","volume":"30","author":"Seltzer M. I.","year":"2007","unstructured":"M. I. Seltzer . Berkeley DB : A Retrospective . IEEE Data Eng. Bull. , 30 ( 3 ): 21 -- 28 , 2007 . M. I. Seltzer. Berkeley DB: A Retrospective. IEEE Data Eng. Bull., 30(3):21--28, 2007.","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_2_1_25_1","first-page":"201","volume-title":"Proceedings of the 9th International Workshop on Persistent Object Systems","author":"Skoglund E.","year":"2000","unstructured":"E. Skoglund , C. Ceelen , and J. Liedtke . Transparent orthogonal checkpointing through user-level pagers . In Proceedings of the 9th International Workshop on Persistent Object Systems , pages 201 -- 215 , Lillehammer, Norway, Sept. 6--8 2000 . E. Skoglund, C. Ceelen, and J. Liedtke. Transparent orthogonal checkpointing through user-level pagers. In Proceedings of the 9th International Workshop on Persistent Object Systems, pages 201--215, Lillehammer, Norway, Sept. 6--8 2000."},{"key":"e_1_2_1_26_1","volume-title":"High Availability and Performance Computing Workshop (HAPCW'06)","author":"Vall\u00e9e G.","year":"2006","unstructured":"G. Vall\u00e9e , T. Naughton , H. Ong , and S. L. Scott . Checkpoint\/restart of virtual machines based on xen . In High Availability and Performance Computing Workshop (HAPCW'06) , Santa Fe, New Mexico, USA , Oct. 2006 . Held in conjunction with LACSI 2006. G. Vall\u00e9e, T. Naughton, H. Ong, and S. L. Scott. Checkpoint\/restart of virtual machines based on xen. In High Availability and Performance Computing Workshop (HAPCW'06), Santa Fe, New Mexico, USA, Oct. 2006. Held in conjunction with LACSI 2006."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095825"},{"key":"e_1_2_1_28_1","first-page":"379","volume-title":"Proc. USENIX Annual Technical Conference","author":"Warfield A.","year":"2005","unstructured":"A. Warfield , K. Fraser , S. Hand , and T. Deegan . Facilitating the development of soft devices . In Proc. USENIX Annual Technical Conference , pages 379 -- 382 , 2005 . A. Warfield, K. Fraser, S. Hand, and T. Deegan. Facilitating the development of soft devices. In Proc. USENIX Annual Technical Conference, pages 379--382, 2005."},{"key":"e_1_2_1_29_1","volume-title":"USENIX Hot Topics in Operating Systems (HOTOS)","author":"Warfield A.","year":"2005","unstructured":"A. Warfield , R. Ross , K. Fraser , C. Limpach , and S. Hand . Parallax: Managing storage for a million machines . In USENIX Hot Topics in Operating Systems (HOTOS) , 2005 . A. Warfield, R. Ross, K. Fraser, C. Limpach, and S. Hand. Parallax: Managing storage for a million machines. In USENIX Hot Topics in Operating Systems (HOTOS), 2005."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI 2004","author":"Whitaker A.","year":"2004","unstructured":"A. Whitaker , R. S. Cox , and S. D. Gribble . Configuration debugging as search: Finding the needle in the haystack . In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI 2004 ), San Francisco, CA , December 2004 . A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration debugging as search: Finding the needle in the haystack. In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI 2004), San Francisco, CA, December 2004."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.44"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341312.1341341","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1341312.1341341","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:39:14Z","timestamp":1750253954000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1341312.1341341"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["10.1145\/1341312.1341341"],"URL":"https:\/\/doi.org\/10.1145\/1341312.1341341","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2008,1]]},"assertion":[{"value":"2008-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}