{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:06:54Z","timestamp":1748668014836},"reference-count":30,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10,1]]},"abstract":"<p>In virtualized environments, the customers who purchase virtual machines (VMs) from a third-party cloud would expect that their VMs run in an isolated manner. However, the performance of a VM can be negatively affected by co-resident VMs. In this paper, the authors propose vExplorer, a distributed VM I\/O performance measurement and analysis framework, where one can use a set of representative I\/O operations to identify the I\/O scheduling characteristics within a hypervisor, and potentially leverage this knowledge to carry out I\/O based performance attacks to slow down the execution of the target VMs. The authors evaluate their prototype on both Xen and VMware platforms with four server benchmarks and show that vExplorer is practical and effective. The authors also conduct similar tests on Amazon\u2019s EC2 platform and successfully slow down the performance of target VMs.<\/p>","DOI":"10.4018\/ijghpc.2013100102","type":"journal-article","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T16:43:40Z","timestamp":1394210620000},"page":"5-29","source":"Crossref","is-referenced-by-count":2,"title":["Measuring the Characteristics of Hypervisor I\/O Scheduling in the Cloud for Virtual Machine Performance Interference"],"prefix":"10.4018","volume":"5","author":[{"given":"Ziye","family":"Yang","sequence":"first","affiliation":[{"name":"EMC Labs, Shanghai, China"}]},{"given":"Haifeng","family":"Fang","sequence":"additional","affiliation":[{"name":"EMC Labs, Shanghai, China"}]},{"given":"Yingjun","family":"Wu","sequence":"additional","affiliation":[{"name":"EMC Labs, Shanghai, China"}]},{"given":"Chunqi","family":"Li","sequence":"additional","affiliation":[{"name":"EMC Labs, Shanghai, China"}]}],"member":"2432","reference":[{"key":"ijghpc.2013100102-0","unstructured":"Ajay, G., Arif, M., & Peter, J. V. (2010). mclock: Handling throughput variability for hypervisor io scheduling. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation."},{"key":"ijghpc.2013100102-1","doi-asserted-by":"crossref","unstructured":"Ajay, G., Chethan, K., & Irfan, A. (2010). Modeling workloads and devices for io load balancing in virtualized environments. SIGMETRICS Perform. Eval. Rev., 37.","DOI":"10.1145\/1710115.1710127"},{"key":"ijghpc.2013100102-2","unstructured":"Amazon elastic compute. (n.d.). Retrieved from http:\/\/aws.amazon.com\/ec2\/"},{"key":"ijghpc.2013100102-3","unstructured":"Amittai, A., Sen, H., Bryan, F., & Ramakrishna, G. (2010). Determinating timing channels in compute clouds. In Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop."},{"key":"ijghpc.2013100102-4","unstructured":"bonnie. Retrieved from http:\/\/www.textuality.com\/bonnie\/"},{"key":"ijghpc.2013100102-5","unstructured":"Bouganim, L. B. T., & Bonnet, P. (2009). uflip: Understanding flash IO patterns. In Proceedings of the CIDR, Fourth Biennial Conference on Innovative Data Systems Research."},{"key":"ijghpc.2013100102-6","unstructured":"Cfq I\/O scheduler. (n.d.). Retrieved from http:\/\/en.wikipedia.org\/wiki\/CFQ"},{"key":"ijghpc.2013100102-7","doi-asserted-by":"crossref","unstructured":"David, B., & Abhishe, C. (2010). Does virtualization make disk scheduling pass\u00b4e? SIGOPS Oper. Syst. Rev., 44.","DOI":"10.1145\/1740390.1740396"},{"key":"ijghpc.2013100102-8","unstructured":"Deadline I\/O scheduler. (n.d.). Retrieved from http:\/\/en.wikipedia.org\/wiki\/Deadline schedulerO"},{"key":"ijghpc.2013100102-9","unstructured":"Deshane, T., Mccabe, M., & Matthews, J. N. (n.d.). Performance isolation of a misbehaving virtual machine with xen, vmware and solaris."},{"key":"ijghpc.2013100102-10","unstructured":"Diego, O., Alan, L. C., & Scott, R. (2008). Scheduling I\/O in virtual machine monitors. In Proceedings of the Fourth ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments."},{"key":"ijghpc.2013100102-11","unstructured":"Diwaker, G., Ludmila, G., Rob, G., & Amin, V. (2006). Enforcing performance isolation across virtual machines in Xen. In Proceedings of the ACM\/IFIP\/USENIX 2006 International Conference on Middleware."},{"key":"ijghpc.2013100102-12","unstructured":"hping. (n.d.). Retrieved from http:\/\/www.hping.org\/"},{"key":"ijghpc.2013100102-13","unstructured":"IOzone. Retrieved from http:\/\/www.iozone.org\/"},{"key":"ijghpc.2013100102-14","unstructured":"Jeremy, S., Ganesh, V., & Beng-Hong, L. (2001). Virtualizing I\/O devices on vmware workstation\u2019s hosted virtual machine monitor. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference (pp. 1\u201314)."},{"key":"ijghpc.2013100102-15","author":"T. B.Jerrold","year":"2006","journal-title":"The essential physics of medical imaging"},{"key":"ijghpc.2013100102-16","unstructured":"Mukil, K., Ada, G., & Karsten, S. (2010). On disk I\/O scheduling in virtual machines. In Proceedings of the 2nd Conference on I\/O Virtualization."},{"key":"ijghpc.2013100102-17","unstructured":"mysql. (n.d.). Retrieved from http:\/\/www.mysql.com\/"},{"key":"ijghpc.2013100102-18","unstructured":"Noop i\/o scheduler. (n.d.). Retrieved from http:\/\/en.wikipedia.org\/wiki\/Noop scheduler"},{"key":"ijghpc.2013100102-19","unstructured":"NTP. (n.d.). Retrieved from http:\/\/www.ntp.org\/"},{"key":"ijghpc.2013100102-20","unstructured":"Paul, B., Boris, D., Keir, F., Steven, H., Tim, H., & Alex, H. \u2026 Andrew, W. (2003). Xen and the art of virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles."},{"key":"ijghpc.2013100102-21","unstructured":"PostMark. (n.d.). Retrieved from https:\/\/koala.cs.pub.ro\/redmine\/attachments\/download\/605\/Katcher97-postmark-netapp-tr3022.pdf"},{"key":"ijghpc.2013100102-22","unstructured":"Ray, B., Dave, R., & Roger, S. (2001). Penguinometer: A new file-i\/o benchmark for linux. In Proceedings of the 5th annual Linux Showcase & Conference (Vol. 5, pp. 10\u201310)."},{"key":"ijghpc.2013100102-23","unstructured":"Ron, C. C., & Howie, H. (2011). TRACON: Interference-aware scheduling for data-intensive applications in virtualized environments. In Proceedings of 2011 International Conference for High Performance Computing, Networking, Storage and Analysis."},{"key":"ijghpc.2013100102-24","unstructured":"Seetharami, R. S., & Patricia, J. T. (2007). Virtual I\/O scheduler: a scheduler of schedulers for performance virtualization. In Proceedings of the 3rd International Conference on Virtual Execution Environments."},{"key":"ijghpc.2013100102-25","unstructured":"Side channel attacks. (n.d.). Retrieved from http:\/\/en.wikipedia.org\/wiki\/Side_channelattack"},{"key":"ijghpc.2013100102-26","unstructured":"Sitaram, I., & Peter, D. (2001). Anticipatory scheduling: A disk scheduling framework to overcome deceptive idleness in synchronous i\/o. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles."},{"key":"ijghpc.2013100102-27","unstructured":"Taesoo, K., Marcus, P., & Gloria, M. (2012). Stealthmem: system-level protection against cache-based side channel attacks in the cloud. In Proceedings of the 21st USENIX Conference on Security Symposium."},{"key":"ijghpc.2013100102-28","unstructured":"Thomas, R., Eran, T., Hovav, S., & Stefan, S. (2009). Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Proceedings of the 16th ACM Conference on Computer and Communications Security (pp. 199\u2013212)."},{"key":"ijghpc.2013100102-29","unstructured":"YinQian. Z., Ari, J., Alina, O., & Michael, K. R. (2011). Homealone: Coresidency detection in the cloud via side-channel analysis. In Proceedings of the 2011 IEEE Symposium on Security and Privacy (Oakland) (pp. 313\u2013328)."}],"container-title":["International Journal of Grid and High Performance Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=102754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:20:23Z","timestamp":1654132823000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijghpc.2013100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2013,10,1]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijghpc.2013100102","relation":{},"ISSN":["1938-0259","1938-0267"],"issn-type":[{"value":"1938-0259","type":"print"},{"value":"1938-0267","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,1]]}}}