Font Size: a A A

Based Security Mechanisms In Virtualized Cloud Computing Platform

Posted on:2011-03-16Degree:MasterType:Thesis
Country:ChinaCandidate:J XueFull Text:PDF
GTID:2208360305459300Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
Since being proposed in 2007, cloud computing has been a hot researching area of computer network technology at home and abroad. At present, some giant industry companies can offer the cloud services, such as IBM, Google, Amazon, Microsoft and so on. Amazon's EC2 and Google's Google App Engine are typical cloud service. Through the Internet, cloud computing links a large number of resources, then software and IT infrastructure as a resource for outside services. Following the distributed processing, parallel processing and grid computing, Cloud computing becomes a new computing model.But cloud computing has great risk on data integrity, data recovery and privacy, etc. Leading U.S. market research firm Gartner released a report "Assessing the Security Risks of Cloud Computing" in June 2008, this report said that cloud computing industry has huge market potential, but security issues impede the development.The existing data files'security mechanisms of cloud computing are based on virtual machine technology, through adding a software layer into the virtual machine monitor, the cloud platform and its internal data are protected. By research on EMC's credibility virtual facilities project "Daoli", this paper proposed an algorithm PSCBT (Process Schedule based on Complete Binary Tree) to dynamic control the data encryption, this paper's work based on the achieved CHAOS system and Shepherd system, this algorithm is aimed at the user's I/O data files, which require a higher security.PSCBT algorithm is based on the structure of complete binary tree. In order to achieve the dynamic control, this paper adds a new model into Shepherd system, the new model mainly used to count the number of abnormal system calls, the result will be used to control the depth of complete tree. After a large number of experiments, we concluded that PSCBT algorithm has a good protective for I/O data files, which require higher security and privacy.
Keywords/Search Tags:Cloud Computing, Security Mechanism, Virtual Machine Monitor, PSCBT
PDF Full Text Request
Related items