liar programming languages, only relying on a mini-
mal library that communicates with the kernel mo-
dule. Executing the policies in user space isolates the
OS kernel from faulty policies while supporting a rich
set of policies.
6 CONCLUSION
This paper describes Balva: a cloud storage service
that transparently interpositions meta-code between
applications and file system calls. By implementing
security and management policies as meta-code at-
tached to objects, Balva enables users to extend the
storage system at runtime to enforce customized po-
licies for encryption, replication, auditing, and access
control. The experimental evaluations of the Balva
kernel module show that our flexible security and ma-
nagement policies can be supported with little over-
head on the I/O performance.
ACKNOWLEDGMENTS
This work was supported in part by the Norwegian
Research Council project numbers 231687/F20. We
would like to thank the anonymous reviewers for their
useful insights and comments.
REFERENCES
Ardagna, Danilo (2015). “Cloud and Multi-cloud Com-
puting: Current Challenges and Future Applications”.
In: Proceedings of the Seventh International Works-
hop on Principles of Engineering Service-Oriented
and Cloud Systems. PESOS ’15. Florence, Italy: IEEE
Press, pp. 1–2.
Chen, Feng and Grigore Ro¸su (2007). “Mop: an efficient
and generic runtime verification framework”. In: ACM
SIGPLAN Notices. Vol. 42. 10. ACM, pp. 569–588.
Dobre, Dan, Paolo Viotti, and Marko Vukoli
´
c (2014). “Hy-
bris: Robust Hybrid Cloud Storage”. In: Proceedings of
the ACM Symposium on Cloud Computing. SOCC ’14.
Seattle, WA, USA: ACM, 12:1–12:14.
Dourish, Paul et al. (2000). “A programming model for
active documents”. In: Proceedings of the 13th an-
nual ACM symposium on User interface software and
technology. ACM, pp. 41–50.
Felter, Wes et al. (2015). “An updated performance com-
parison of virtual machines and Linux containers”.
In: Performance Analysis of Systems and Software
(ISPASS), 2015 IEEE International Symposium on,
pp. 171–172.
Gurrin, Cathal, Alan F. Smeaton, and Aiden R. Doherty
(2014). “LifeLogging: Personal Big Data”. In: Founda-
tions and Trends in Information Retrieval 8.1, pp. 1–
125.
Hurley, J. and D. Johansen (2014). “Self-Managing Data in
the Clouds”. In: 2014 IEEE International Conference
on Cloud Engineering, pp. 417–423.
Jia, Qin et al. (2016). “Smart spot instances for the su-
percloud”. In: Proceedings of the 3rd Workshop on
CrossCloud Infrastructures & Platforms. ACM, p. 5.
Johansen, Dag and Joseph Hurley (2011). “Overlay cloud
networking through meta-code”. In: Computer Soft-
ware and Applications Conference Workshops (COMP-
SACW), 2011 IEEE 35th Annual. IEEE, pp. 273–278.
Johansen, Håvard D. et al. (2013). “Combining Video
and Player Telemetry for Evidence-Based Decisions in
Soccer”. In: Proc. of the Int. Congr. on Sports Science
Research and Technology Support.
Johansen, Håvard D et al. (2015). “Enforcing privacy poli-
cies with meta-code”. In: Proceedings of the 6th Asia-
Pacific Workshop on Systems. ACM, p. 16.
McKeen, Frank et al. (2013). “Innovative instructions and
software model for isolated execution.” In: HASP@
ISCA, p. 10.
Renesse, Robbert van et al. (2013). “Secure Abstraction
with Code Capabilities”. In: Proc. of the 21st Euromi-
cro Int. Conf. on Parallel, Distributed, and Network-
Based Processing.
Schwab, Klaus (2016). “The fourth industrial revolution”.
In: World Economic Forum Geneva.
Singh, Sumit (2006). Develop your own fi-
lesystem with FUSE. Developer Works.
https://www.ibm.com/developerworks/library/l-fuse/.
IBM.
Soltesz, Stephen et al. (2007). “Container-based Operating
System Virtualization: A Scalable, High-performance
Alternative to Hypervisors”. In: Proc. of the 2nd ACM
SIGOPS/EuroSys European Conference on Computer
Systems. EuroSys ’07, pp. 275–287.
Song, Dawn et al. (2012). “Cloud data protection for the
masses”. In: Computer 45.1, pp. 39–45.
Stenhaug, Magnus, Håvard Johansen, and Dag Johansen
(2016). “Transforming Healthcare through Life-long
Personal Digital Footprints”. In: Proc. IEEE Con-
ference on Connected Health: Applications, Systems
and Engineering Technologies: The 1st International
Workshop on Cloud Connected Health. CHASE ’16.
IEEE.
Vahldiek-Oberwagner, Anjo et al. (2015). “Guardat: Enfor-
cing data policies at the storage layer”. In: Proceedings
of the Tenth European Conference on Computer Sys-
tems. ACM, p. 13.
Wu, Zhe et al. (2013). “Spanstore: Cost-effective geo-
replicated storage spanning multiple cloud services”.
In: Proceedings of the Twenty-Fourth ACM Symposium
on Operating Systems Principles. ACM, pp. 292–308.
CLOSER 2017 - 7th International Conference on Cloud Computing and Services Science
700