Scalable techniques for data transfer between virtual machines
First Claim
1. An apparatus, comprising:
- circuitry;
a virtual machine management component for execution by the circuitry to;
define a plurality of public virtual memory spaces including a first public virtual memory space and a second public virtual memory space; and
for each of the public virtual memory spaces, assign the respective public virtual memory space to a respective one of a plurality of virtual machines, the plurality of virtual machines comprising a first virtual machine and a second virtual machine, the first public virtual memory space to be assigned to the first virtual machine, the second public virtual memory space to be assigned to the second virtual machine, each public virtual memory space writable only by the virtual machine to which the public virtual memory space is assigned and readable by the plurality of virtual machines; and
the first virtual machine to;
identify data to be provided to the second virtual machine by writing to the first public virtual memory space, the second virtual machine not permitted to write to the first public virtual memory space,encrypt the data using a symmetric encryption key dedicated for use in encryption of data for the second virtual machine, andwrite the encrypted data to the first public virtual memory space, andthe second virtual machine to decrypt the encrypted data in the first public virtual memory space using the symmetric encryption key.
1 Assignment
0 Petitions
Accused Products
Abstract
Scalable techniques for data transfer between virtual machines (VMs) are described. the disclosure provides an apparatus including circuitry, a virtual machine management component for execution by the circuitry to define a plurality of public virtual memory spaces and assign each one of the plurality of public virtual memory spaces to a respective one of a plurality of VMs including a first VM and a second VM, and a virtual machine execution component for execution by the circuitry to execute a first virtual machine process corresponding to the first VM and a second virtual machine process corresponding to the second VM, the first virtual machine process to identify data to be provided to the second VM by the first VM and provide the data to the second VM by writing to a public virtual memory space assigned to the first VM. Other embodiments are described and claimed.
-
Citations
22 Claims
-
1. An apparatus, comprising:
-
circuitry; a virtual machine management component for execution by the circuitry to; define a plurality of public virtual memory spaces including a first public virtual memory space and a second public virtual memory space; and for each of the public virtual memory spaces, assign the respective public virtual memory space to a respective one of a plurality of virtual machines, the plurality of virtual machines comprising a first virtual machine and a second virtual machine, the first public virtual memory space to be assigned to the first virtual machine, the second public virtual memory space to be assigned to the second virtual machine, each public virtual memory space writable only by the virtual machine to which the public virtual memory space is assigned and readable by the plurality of virtual machines; and the first virtual machine to; identify data to be provided to the second virtual machine by writing to the first public virtual memory space, the second virtual machine not permitted to write to the first public virtual memory space, encrypt the data using a symmetric encryption key dedicated for use in encryption of data for the second virtual machine, and write the encrypted data to the first public virtual memory space, and the second virtual machine to decrypt the encrypted data in the first public virtual memory space using the symmetric encryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
defining a plurality of public virtual memory spaces including a first public virtual memory space and a second public virtual memory space; for each of the public virtual memory spaces, assigning the respective public virtual memory space to a respective one of a plurality of virtual machines, the plurality of virtual machines comprising a first virtual machine and a second virtual machine, the first public virtual memory space to be assigned to the first virtual machine, the second public virtual memory space to be assigned to the second virtual machine, each public virtual memory space writable only by the virtual machine to which the public virtual memory space is assigned and readable by the plurality of virtual machines; and the first virtual machine to; identify data to be provided to the second virtual machine by writing to the first public virtual memory space, the second virtual machine not permitted to write to the first public virtual memory space, encrypt the data using a symmetric encryption key dedicated for use in encryption of data for the second virtual machine, and write the encrypted data to the first public virtual memory space, and the second virtual machine to decrypt the encrypted data in the first public virtual memory space using the symmetric encryption key. - View Dependent Claims (10, 11, 12, 13)
-
-
14. At least one non-transitory computer-readable storage medium comprising a set of instructions that, in response to being executed on a computing device, cause the computing device to:
-
define a plurality of public virtual memory spaces including a first public virtual memory space and a second public virtual memory space; for each of the public virtual memory spaces, assign the respective public virtual memory space to a respective one of a plurality of virtual machines, the plurality of virtual machines comprising a first virtual machine and a second virtual machine, the first public virtual memory space to be assigned to the first virtual machine, the second public virtual memory space to be assigned to the second virtual machine, each public virtual memory space writable only by the virtual machine to which the public virtual memory space is assigned and readable by the plurality of virtual machines; and the first virtual machine to; identify data to be provided to the second virtual machine by writing to the first public virtual memory space, the second virtual machine not permitted to write to the first public virtual memory space, encrypt the data using a symmetric encryption key dedicated for use in encryption of data for the second virtual machine, and write the encrypted data to the first public virtual memory space, and the second virtual machine to decrypt the encrypted data in the first public virtual memory space using the symmetric encryption key. - View Dependent Claims (15, 16, 17, 18)
-
-
19. An apparatus, comprising:
-
means for defining a plurality of public virtual memory spaces including a first public virtual memory space and a second public virtual memory space; for each of the public virtual memory spaces, means for assigning the respective public virtual memory space to a respective one of a plurality of virtual machines, the plurality of virtual machines comprising a first virtual machine and a second virtual machine, the first public virtual memory space to be assigned to the first virtual machine, the second public virtual memory space to be assigned to the second virtual machine, each public virtual memory space writable only by the virtual machine to which the public virtual memory space is assigned and readable by the plurality of virtual machines; and means for, the first virtual machine to; identify data to be provided to the second virtual machine by writing to the first public virtual memory space, the second virtual machine not permitted to write to the first public virtual memory space, encrypt the data using a symmetric encryption key dedicated for use in encryption of data for the second virtual machine, and write the encrypted data to the first public virtual memory space, and the second virtual machine to decrypt the encrypted data in the first public virtual memory space using the symmetric encryption key. - View Dependent Claims (20, 21, 22)
-
Specification