Font Size: a A A

Research On Virtual Machine Image Security Management Model In Cloud Computing Environment

Posted on:2013-10-26Degree:MasterType:Thesis
Country:ChinaCandidate:X M ZhuFull Text:PDF
GTID:2208330434970237Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Cloud computing is an appealing innovation of modern computing mode. By integrating networked computing resources and virtualizing them through different levels of abstractions, cloud computing provides users massive computing resources using a common interface. Further, cloud computing hides the complexity in deployment and management of hardware resources, software stack and networking protocols from users. But cloud computing has great risk on data integrity, data recovery and privacy, etc. The existing data files’security mechanisms of cloud computing are based on virtual machine technology.First of all, we introduce the status of virtualization technology, as the basic of our experiment, we then explain the Xen and Hypervisor which in the virtual machine monitor layer. We point out two security defects of Mirage model that access control rule is too static and filter strategy is too simple after deeply study the model and analysis the security problem it faced. Aimed at the security defects of Mirage model, we raise the SI-Mirage model. The model regard user call the virtual image as an independent event, estimate the security effect of run the event in the cloud system by introduce safe index and establish trust model for every object in the event. Then optimize the access control rule in the Mirage model and expose some details of the SI-Mirage model’s achieve. Finally, we set up the experiment environment, the test results turn out to be that SI-Mirage model greatly enhance the security of the system, but make a little slowdown to system performance, although the benchmark can be acceptable.
Keywords/Search Tags:Cloud compute, virtualization, Access control
PDF Full Text Request
Related items