respect to this framework, Vinci introduces commu-
nities to simplify the management of users with sim-
ilar security and reliability requirements. PlanetLab
(Chun et al., 2003) is a global overlay network that
runs concurrently multiple services in slices, i.e. net-
works of VMs that include some amount of process-
ing, memory, storage and network resources. While
a slice recalls a Vinci overlay, Vinci allocates in a
fairly static way resources of a private infrastructure,
whereas in PlanetLab they are dynamically discov-
ered and allocated in a world wide network. Further-
more, Vinci introduces communities to define flexible
security policies and it exploits hardware-level virtu-
alization rather than OS-level virtualization, to pre-
vent a VM from accessing information of other VMs
in the same node.
5 CONCLUSIONS
Vinci aims at a secure sharing of a healthcare ICT
infrastructure among users with distinct security lev-
els and reliability requirements. It assumes that each
physical node runs a VMM to manage and protect
the infrastructure resources. Vinci also defines sev-
eral VM templates to support the execution of user
applications, the enforcement of consistency checks,
the implementation, the protection and the monitor-
ing of information flows. VMs are connected into
overlays, one for each user community. A community
is defined according to the security and reliability re-
quirements of its users and of their applications. A
further overlay includes the VMs to create and con-
figure the other overlays and map them onto physical
nodes to achieve the required level of reliability and
security. Preliminary performance and security eval-
uations show that Vinci can guarantee high security
of a healthcare ICT infrastructure with an acceptable
overhead. The overhead due to virtualization can be
strongly reduced because multi-core architectures in-
clude a native support for multiplexing. Furthermore,
they can assign a dedicated core to VMs that imple-
ment critical tasks, such as management and protec-
tion of other VMs, so that they are never delayed.
ACKNOWLEDGEMENTS
This work was supported by Promostudi and by Fon-
dazione Cassa di Risparmio La Spezia.
REFERENCES
Bryant, E., Early, J., Gopalakrishna, R., Roth, G., Spaf-
ford, E., Watson, K., William, P., and Yost, S. (2003).
Poly
2
Paradigm: A Secure Network Service Archi-
tecture. Computer Security Applications Conference,
2003. Proceedings. 19th Annual, pages 342–351.
Chaudhry, B., Wang, J., Wu, S., Maglione, M., Mojica, W.,
Roth, E., Morton, S., and Shekelle, P. (2006). Sys-
tematic Review: Impact of Health Information Tech-
nology on Quality, Efficiency, and Costs of Medical
Care. Annals of Internal Medicine, 144(10):742.
Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L.,
Wawrzoniak, M., and Bowman, M. (2003). Planetlab:
an overlay testbed for broad-coverage services. SIG-
COMM Comput. Commun. Rev., 33(3):3–12.
Dunlap, G. W., King, S. T., Cinar, S., Basrai, M. A.,
and Chen, P. M. (2002). Revirt: enabling intrusion
analysis through virtual-machine logging and replay.
SIGOPS Oper. Syst. Rev., 36(SI):211–224.
Garfinkel, T. and Rosenblum, M. (2003). A Virtual Ma-
chine Introspection Based Architecture for Intrusion
Detection. Proceedings of the 2003 Network and Dis-
tributed System Security Symposium (NDSS).
Goldberg, R. P. (1974). Survey of virtual machine research.
IEEE Computer, 7(6):34–45.
Griffin, J., Jaeger, T., Perez, R., Sailer, R., van Doorn, L.,
and Caceres, R. (2005). Trusted Virtual Domains: To-
ward secure distributed services. 1st IEEE Workshop
on Hot Topics in System Dependability.
Huang, W., Abali, B., and Panda, D. (2006). A case for
high performance computing with virtual machines.
Proc. of the 20th annual international conference on
Supercomputing, pages 125–134.
King, S. T. and Chen, P. M. (2005). Backtracking intrusions.
ACM Trans. Comput. Syst., 23(1):51–76.
L¨ohr, H., Ramasamy, H. V., Sadeghi, A.-R., Schulz, S.,
Schunter, M., and St¨uble, C. (2007). Enhancing Grid
Security Using Trusted Virtualization. In ATC, pages
372–384.
Pearson, S. (2002). Trusted Computing Platforms, the Next
Security Solution. Beaverton, USA: Trusted Comput-
ing Group Administration.
Sailer, R., Jaeger, T., Zhang, X., and van Doorn, L. (2004).
Attestation-based policy enforcement for remote ac-
cess. In CCS ’04: Proceedings of the 11th ACM con-
ference on Computer and communications security,
pages 308–317, New York, NY, USA. ACM Press.
Uhlig, R., Neiger, G., Rodgers, D., Santoni, A., Marting,
F., Anderson, A., Bennett, S., Kagi, A., Leung, F.,
and Smith, L. (2005). Intel Virtualization Technology.
Computer, 38(5):48–56.
Wolinsky, D. I. and et al. (2006). On the Design of Vir-
tual Machine Sandboxes for Distributed Computing in
Wide Area Overlays of Virtual Workstations. In First
Workshop on Virtualization Tech. in Distributed Com-
puting (VTDC).
HEALTHINF 2009 - International Conference on Health Informatics
128