Font Size: a A A

Research Of The Security Module In Virtualization Technology

Posted on:2009-03-25Degree:MasterType:Thesis
Country:ChinaCandidate:H W ZhuFull Text:PDF
GTID:2178360242983108Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of computer technology, network security and information security has become increasingly important. Security control mechanism can not meet the increasingly complex needs of a variety of applications, these security needs may also be conflict, which makes security systems become increasingly severe.Based on the original VMM technology, we study in achieving security access control model in VMM. The main contribution are as follows:First of all, we analysis of the foundation technology of the VMM, we increate security hook to the visit of the virtual resources in the VMM for the VM to security access to resources and provide the access control mechanisms in data communication, so we can build multi-level access control model.Second, we study on the potential of several security issues in the VMM environment, design and implement safety control strategy to such problems, we use XML format to descript the strategy, adopt Flask framework in VMM at the same time to separate the management of safety strategy and the security strategy, so we can achieve the dynamic update and maintain the strategy.Finally, we analysis the VMM access control system's performance, think it that may have affected the performance of running VMM performance, we want to reduce the impact, so we use the cache and resources binding mechanisms in the security control module. Tests show that the mechanisms we use have low impact on the running VMM performance. That is acceptable, we verify the correctness of the design.This paper reviewed the current mainstream software virtualization technology, focusing on the existing software virtualization technology security weaknesses. Then, we depict the overall thinking of system from two aspects of the architecture and operation flow. Third, we have the various components module for a detailed description and some senior issues discussed. Finally, we analyze the system's performance data.
Keywords/Search Tags:trusted operating system, trusted computing base, access control
PDF Full Text Request
Related items