Font Size: a A A

Design And Implementation Of Security Evaluation System For Virtual Machine

Posted on:2016-03-07Degree:MasterType:Thesis
Country:ChinaCandidate:Y X FuFull Text:PDF
GTID:2308330482951589Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The development of cloud computing brings new opportunity to virtual machine technology. Around the world, the number of virtual machine is rapidly increased. The concern about Virtual Machine Security is growing for virtualization technology is widely used. This system is the main part of the project named protection technology research and development in cloud computing which belongs to the laboratory I worked in. The main work of this thesis is summarized as follows:1) According to the demand analysis, this thesis realized the design and deployment of system structure and risk assessment index system.2) Based on the risk assessment index model, system evaluates virtual machine security which is heterogeneous complex and takes virtualization technology as the core. According to all previous evaluation results, virtual machine environment information security development trends are presented.3) This thesis completed system configuration files, and achieved database design and deployment.This system is divided into three parts according to the overall design: information collection, service analysis and Web display terminal. Information collection includes four parts which named network security, system security, data security, user security. Service analysis is composited by, examination management, data warehousing and report generating.Web display terminal shows all history test results through taking the initiative to query and generating reports by visualization mode.This system not only provides instant, objective, accurate and reliable information security evaluation analysis for virtual environment, but also can provide a scientific, efficient and practical technical support for information security policy formulation and implementation of virtual environment. At the end of the thesis, the author gives a summary and the consequence of system implementation. Aiming at the existing shortcomings in the system, the thesis puts forward some feasible suggestions for follow-up work.
Keywords/Search Tags:Virtual machine security, Trusted computing, Quantitative assessment, Security policy, Trend analysis approach
PDF Full Text Request
Related items