Font Size: a A A

The Research Of Security Tactics For Virtual Machine Live Migration Based On Cloud Computing

Posted on:2016-07-19Degree:MasterType:Thesis
Country:ChinaCandidate:Y D ChenFull Text:PDF
GTID:2308330464468532Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In recent years, cloud computing technology is widely used and developed. Cloud computing services will be provided through a network of local integration of large amounts of server resources to multiple users. Based on its composition form, Cloud computing demand scalability advantages. However, while the cloud is widely used by the network in the case of people to share resources, the user’s data security is difficult to be assured.In the Cloud Computing, the most widely used is virtual machine live migration technology. Live migration of virtual machine clusters can easily management, maintain and load balancing, resource optimization. Most of the current research focuses on consider shortening migration time or how to quickly migrate, how to reduce the migration of other aspects, in the terms of virtual machine on live migration of safety needs further study.This dissertation analyzes the basic Cloud Computing environment existing data on information security issues, data security issues from starting, focus on Cloud Computing environments live migration of virtual machine network attacks encountered in the process, leading to the integrity, confidentiality, data protection and other issues, mainly on issues related to Cloud Computing environments live migration of virtual machines in a study involving safety. The main research works of this dissertation are as the followings:First of all, understand and study the existing in Cloud Computing virtual machine migration methodology and technical characteristics, analyzes the advantages and security problems they have existed.Secondly, due to the fact that certain faults may be involved during the live migration of virtual machine in the cloud, it clarifies the existence of information security issues. Respectively from three aspects of the virtual machine monitor, migrate data and migration module analyzes there are attacks in live migration process; Then, for each type of attack defense methods are proposed. Thus, we improved the protection of live migration of virtual machines.Migrating data protection module is to protect the internal migration of virtual machine memory pages, interception, encryption and decryption part responsible for memory page of data. Metadata management module is mainly responsible for the spread vacate end metadata belonging to migrate virtual machines to collect and serialized in the destination virtual machine metadata will be transferred and in reverse order and reconstruction. Security control module is mainly responsible for the defense of some security vulnerabilities, protect virtual machines live migration mechanism simulation results show the possibility of an attack during the live migration of virtual machines, to illustrate the effectiveness of the proposed method of defense.Thirdly, Combined with the above-mentioned study, through the analysis of an existing virtual machine live migration algorithm, especially for pre-copy mechanisms to improve virtual machine migration agreement presents a relatively complete security mechanism to migrate a virtual machine security protocols to improve migration process safety. The agreement includes live migration of both pre-certification and safety migrate virtual machines in two parts. Live migration of both parties before the handshake authentication protocol, move out and move to end mutual authentication virtual machine monitor each other’s integrity and to exchange session keys, such as the establishment of a trusted channel; safe relocation of virtual machines based on Xen’s live migration agreement to add, at the stage of pre-copy the virtual machine suspend and recovery phases were added to the protocol for the protection of security. Though Analysis theory and experiments on CloudSim emulator to illustrate the proposed security agreement live migration is feasible and effective, and it can be used to implement secure live migration of virtual machines for protection.This dissertation is a Cloud Computing environment virtual machine live migration-related issues involved in the safety of a beneficial attempt. Thesis research work and achievements of cloud computing security and safety of live migration better reference, research results have certain scientific significance and practical value.
Keywords/Search Tags:Cloud Computing, security, virtual machine, live migration
PDF Full Text Request
Related items