Font Size: a A A

Research Of Virtualization Dependability In Cloud Computing

Posted on:2015-05-20Degree:MasterType:Thesis
Country:ChinaCandidate:X TianFull Text:PDF
GTID:2298330467955788Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Cloud computing has become a reality in business applications, but with the development ofcloud computing, the user of cloud computing services is more and more, and the questions aboutthe credibility of cloud computing is becoming increasingly important. A we ll-known marketresearch firm Gartner has released a research report,which presented cloud computing servicesindustry has huge market potential, but the credibility problem will become an important obstacle toits development. In this paper, by improving the previously technologies associated with thecredibility makes cloud computing to better credibility.This paper made a thorough study and analysis of EMC ’s trusted cloud computing platformDaoli which used CHAOS subsystems and subsystem Shepherd, the two systems are throughadding software layer in the cloud computing platform virtual machine monitor in order to protectthe system and user applications of the platform. The use of AES encryptionalgorithm to encrypt I/O data in the CHAOS subsystem, the encryption intensity is not high; at thesame time, key management mechanisms in CHAOS system using the linear structure,the keymanagement mechanism is relatively easy to implement, but notreliable.Next, paper first proposedincreasing the length of the algebraic expression of AES S-box through using the inverse of theswitching sequence multiplication and affine transform operation which is used in the I/Osubsystem data of CHAOS in order to improve; Secondly, CHAOS subsystem key managementmechanism has been proposed to improve, so is the FBTA which is based on full binary tree-basedencryption process; Finally, in order to adapt FBTA algorithm, papers increase improvements ofthe abnormal process statistics on the Shepherd subsystem, forming i-Shepherd subsystem.In order to test the i-Shepherd subsystem, we built a virtual environment test, we outcomeevaluation that the three modules will not be affected; We also used the test procedures to attack theimproved CHAOS subsystem, which verify its improvement in performance.Through theexperiment, the paper finally concluded: After using the improved CHAOS subsystems andsubsystem Shepherd, cloud computing credibility can be improved.
Keywords/Search Tags:Cloud computing, Virtualization, Reliability, AES algorithm, Encryption processscheduling algorithm
PDF Full Text Request
Related items