Made in IBM Labs: IBM Drives 'Fort Knox'-Like Security Into Virtualized Data Centers

Feb 06, 2007

IBM today revealed a new software technology from its Research labs designed to greatly enhance security and management capabilities in virtualized data centers.

The new advancement is the industry's first effort to embed trusted computing technologies directly into the virtualization and management software tools already used inside data centers. This new technology allows for stronger data integrity guarantees and offers a higher degree of confidence that workloads and data are secure.

Virtualized data centers are becoming increasingly common in business, where multiple workloads, consisting of operating systems, middleware and applications, reside on a single physical computer system. The IBM secure hypervisor architecture, or "sHype," is a Research technology designed to run in conjunction with commercial and open source hypervisors that control servers and data in a shared environment. sHype aims to provide a security "wrapper" around distributed workloads in the data center, extending mainframe-like security to pooled data and resources across multiple IBM and non-IBM systems.

sHype is designed to bring stronger security guarantees to popular x86 and blade servers. As is increasingly common, IBM Research developed the sHype technology not just in its own labs, but implementing early versions of sHype with customers to test and evaluate the code. Additionally, portions of sHype have been contributed to the Open Source community and are being used, for example, as part of the open source Xen hypervisor kernel.

"IBM is a major contributor to the Xen Project, and the adoption of their sHype mandatory access control (MAC) technology allows Xen to offer a unified security framework for Windows and Linux virtualization without compromising performance," said Dr. Ian Pratt, Xen project leader and XenSource founder.

Hoping to extend sHype beyond x86 hardware, IBM plans to introduce several other technologies with sHype as part of a comprehensive strategy to give customers the simplest, most secure and most efficient data centers possible.

"Thanks to the simplification benefits of the technology, virtualization adoption is on the rise but concerns about securing the virtualized data center persist," said Rich Lechner, Vice President, IBM Virtualization. "By putting security directly into the hypervisor virtualization layer, IBM Research has created a unique capability in sHype, providing clients with additional assurance that their virtualized data is protected."

Traditional IT security is based on built-in security for one or more user-chosen operating systems, and additional security from applications running on these operating systems. However, the steady stream of patches and updates required to protect the bulky code of an operating system and application stack is causing a heavy burden on customers.

Designing security into the much smaller, much easier to protect hypervisor architecture code creates a very tight wall of protection around physical resources in the data center, including the hardware, operating systems, applications, software hypervisors, workloads and virtual resources running in the now-secured environment. It also creates secure data pipes inside of a virtualized environment, essentially locking and monitoring data from outside threats or internal errors, by protecting the data from other workloads and applications running across the same virtualized data center.

sHype works in conjunction with hypervisors by establishing a virtual machine to act as a data center "security foreman." The foreman uses preset configurations, business policies and exceptions set by the customer to lock down all content of the data center. It then automatically sets policies that evaluate, rank and code workloads as well as the physical and virtual resources needed to run each workload. Once workloads and resources are locked together, the integrity of the data and resources is assured and can be better managed by hypervisors accordingly.

IBM Research has successfully implemented significant elements of their sHype architecture with multiple hypervisors as part of the company's effort to demonstrate the architecture's flexibility and security capabilities. IBM is also working with industry groups to help standardize the aspects of sHype in order to achieve strong guarantees in and to simplify management of security in heterogeneous virtualized environments.

Source: IBM

Explore further: Microsoft Research project can interpret, caption photos

Related Stories

The monopoly of aluminium is broken

9 hours ago

Discovering Majorana's was only the first step, but utilizing it as a quantum bit (qubit) still remains a major challenge. An important step towards this goal has just been taken, as shown by researchers ...

Yik Yak's frat-bro founders shrug off growing pains

9 hours ago

The most popular post of all time on Yik Yak is a dirty joke. Less than 2 years old, the Atlanta-based social network is geared mostly toward college students who access and post unsigned announcements through an app on their ...

Fears for pink iguanas as Galapagos volcano erupts

10 hours ago

A volcano in the Galapagos islands erupted for the first time in more than 30 years Monday, sending streams of lava flowing down its slopes and potentially threatening the world's only colony of pink iguanas.

Recommended for you

Microsoft Research project can interpret, caption photos

May 29, 2015

If you're surfing the web and you come across a photo of the Mariners' Felix Hernandez on the pitchers' mound at Safeco Field, chances are you'll quickly interpret that you are looking at a picture of a baseball ...

Rumor-detection software IDs disputed claims on Twitter

May 29, 2015

A week after the Boston marathon bombing, hackers sent a bogus tweet from the official Twitter handle of the Associated Press. It read: "Breaking: Two Explosions in the White House and Barack Obama is injured."

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.