SPARC: a security and privacy aware virtual machinecheckpointing mechanism

  • Authors:
  • Mikhail I. Gofman;Ruiqi Luo;Ping Yang;Kartik Gopalan

  • Affiliations:
  • State University of New York at Binghamton, Binghamton, USA;State University of New York at Binghamton, Binghamton, USA;State University of New York at Binghamton, Binghamton, USA;State University of New York at Binghamton, Binghamton, USA

  • Venue:
  • Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Virtual Machine (VM) checkpointing enables a user to capture a snapshot of a running VM on persistent storage. VM checkpoints can be used to roll back the VM to a previous "good" state in order to recover from a VM crash or to undo a previous VM activity. Although VM checkpointing eases systems administration and improves usability, it can also increase the risks of exposing sensitive information. This is because the checkpoint may store VM's physical memory pages that contain confidential information such as clear text passwords, credit card numbers, patients' health records, tax returns, etc. This paper presents the design and implementation of SPARC, a security and privacy aware checkpointing mechanism. SPARC enables users to selectively exclude processes and terminal applications that contain sensitive data from being checkpointed. Selective exclusion is performed by the hypervisor by sanitizing memory pages in the checkpoint file that belong to the excluded applications. We describe the design challenges in effectively tracking and excluding process-specific memory contents from the checkpoint file in a VM running the commodity Linux operating system. Our preliminary results show that SPARC imposes only 1% - 5.3% of overhead if most pages are dirty before checkpointing is performed.