AN APPROACH TO INFORMATION SYSTEM ISOLATION ... - CiteSeerX

14 downloads 26459 Views 826KB Size Report
Mar 26, 1973 -
AN APPROACH TO INFORMATION SYSTEM ISOLATION AND SECURITY IN A SHARED FACILITY by Stuart E. Madnick John J. Donovan March 1973

648-73

* This paper is based upon a paper entitled "Application and Analysis of the Virtual Machine Approach to Information System Security and Isolation" that was presented at the ACM Workshop on Virtual Computer Systems, March 26-27, 1973, Harvard University, Cambridge, Massachusetts.

An Approach to Information System Isolation and Security in a Shared Facility

ABSTRACT Security Is an Important factor If the programs of Independent and possibly malicious users are to coexist on the same computer system. In this paper we show that a combined virtual machine monitor/operating system (VMM/OS) approach to Information system Isolation provides substantially better software security than a conventional multiprogramming operating system approach. This added protection s derived from redundant security using Independent mechanisms that are Inherent In the design of most VMM/OS systems.

I.

INTRODUCTION

During (i.e.,

the

on the

the past

decade the

concurrent execution of several

same computer

advantage of medium-

system) has

and redundancy, etc.).

shared

multiprogramming

Independent programs

been developed

to take

full

and large-scale computer systems (e.g., cost

economics, flexibility,

Isolated

technique of

ease of operation, Unfortunately,

Information systems nformation systems

(see

hardware reliability

In transferring physically Figure

(a)) to

(see Figure 1(b)),

we

physically

must cope with

the problems of: operating system compatibility, reliability, and security. In this paper we show that the Virtual Machine approach provides effective solutions to these problems. * Assistant Professor, Project MAC and Sloan School of Management. ** Associate Professor, Project MAC and Department of Electrical Engineering. Work reported herein was supported In part by Project MAC, an M.I.T. research project sponsored by the Advanced Research Projects Agency, Department of Defense, under Office of Naval Research Contract Nonr4102(01)

and in part by the MIT-IBM Security Study Project.

___ ______1_1____1__1__I____

_i------·

1

-_1_11

-2System SI

*

Term ina Ils

System S2

Storage Devices

r

System S3 Central D.tr, I I I

J

t)

(n

/"' __._,

,---

~

" *"

CJ ^ W

,l -:]:~lil,

I

Memory P31 P32

~"

P 33

4cz

(a) Physically Isolated Information Systems

Te Storage Devices

als include ntional I /O units, such as 'eaders, printers, TTY, etc. (b) Physically Shared Information System Figure

.

Isolated and Shared Information

Systems

-3-

II.

VIRTUAL MACHINE APPROACH TO ISOLATION AND COMPATIBILITY

Since

virtual machines

descr bed

extensively

Parmelee(6)) ,

we will

virtual machi ne

computer

by

a were

It

the

as depicted controlling In a

key points.

Machine Monitor

of a Virtual

hardware support.

IBM

It

were

In Figure

to

the

multiple

multiplexing

manner analogous

company multiplexes

appear

System/370's

VMM can

2. A

(See

For example, the

System/370

Thus, a

A

real computer

multiple independent

as if

been

(Madnick(5),

a. replica of a

ssingle

function

hardware resources telephone

briefly review

"virtual mach ines").

Isolated sys5tems feat

literature

a more pre;cise definition).

as If

sy'stem

applications have

and aippropriate

enables

syst :em

(i.e., multi ple

this

only

by a comblna tlion

Goldberg (3, 4) for

functional y

the

in

sof tvrare program

VM/370

their

may be define:d as

system smul ated (VMM)

and

make one physically

VMM accomplishes of

to the

the

physical

way that

communications enabling

the

separate

and, hopefully, isolated conversations over the same wires.

a conventional operating system.

A VMM Is totally unlike VMM restricts Itself the

to the task of

physical hardware,

it presents

Identical to a "bare machine". a

conventional operating

order to accomplish, useful work. basis

for the

problem.

solution to

Each virtual

the

multiplexing and allocating an

Interface that

In fact,

system

nto

each

virtual machine

This latter

in

fact provides the

operating system

___

appears

t is necessary to load

machine Is controlled by

___111_____1_11__1__I____·____I___

A

compatibility a separate, and

-4-

r Central

1

." Processor

I

- Memory

TVP2----

r?"L -.PL-'

- ~~ 1

r Central

Processor

-

I