Font Size: a A A

An Architecture For Dynamic Management And Monitoring Of Virtual Machines

Posted on:2014-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:W ChenFull Text:PDF
GTID:2248330398470752Subject:Information security
Abstract/Summary:PDF Full Text Request
Cloud Computing stands for a new computing pattern compares to the traditional mode, it has been focused on since it ever been proposed in2006. But the problem of cloud computing security is gradually revealed, attracting more and more attention of the industry. As a research shows, for a lot of enterprises, before they determine to introduce cloud computing solutions, the information security problem is the biggest concern.The topic of this paper is security problem of the virtual machine in cloud computing. The cloud user uploads the workload to the cloud computing provider, the cloud computing provider runs them without the knowledge of the guest OSs and their configuration. The workload runs in sharing environment plus the cloud user can’t participate in the monitoring of the running process, which adds the user’s security concern. Cloud users most worry about whether the virtual machines could run normally during the computing process, whether there is data leakage, whether the accidents could be identify and treated effectively.This paper focuses on the research of virtual machines monitoring and managing, and the work includes:1、We analyzed the scene that cloud user rent virtual resources, analyzed the demand for virtual machine security, the user’s wants for take part in the virtual machine monitoring. We proposed a system for virtual machines monitoring based on Xen, provides monitoring service during the virtual machines run.2、We design a console for virtual machine management, provides cloud user with a operating entry for monitoring remotely. Cloud user can check virtual machine status、define security policy or response measures through the console.3、As to the validation of virtual machine OS kernel, we propose a inspection algorithm, we use a list of whitelist of operating system for comparison to determine whether the kernel of the operating system has been write.4、We make a deep research of principle of Xen virtualization, we apply the Flask architecture, add secure hook、secure policy and secure implementation, to realize the control for virtual resources access. Experimental result show that our system enhanced the safety of the Xen virtualization environment, compare to the existing virtual machine monitor resolutions our system make an effective addition...
Keywords/Search Tags:Xen, OS kernel integrity inspection, access control
PDF Full Text Request
Related items