Font Size: a A A

Research Of User Trusted Virtual Manchine In Cloud Environment

Posted on:2018-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:Q C YangFull Text:PDF
GTID:2348330563951196Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cloud computing is a large amount of computing resources,storage resources and network resources connected to a scale effect of the shared virtual resource pool,to provide users with on-demand resource services.Cloud computing can reduce the user's use costs,improve the efficiency of the user,with great convenience and attractiveness,become the focus of the current information technology field.In addition,users lose the physical control and operation right to store in the cloud data,the user can not establish the effective trust of the platform,so the cloud platform credibility problem has become the main obstacle to cloud computing widely used.Trusted computing is an important technology to solve the problem of platform trust,but the current solution is widespread resource constraints,measurement mechanism and other issues.Based on the trusted computing and virtualization technology,this paper starts from the user's configurability of the cloud platform security policy,and studies the virtual machine credibility of the user in the cloud environment.Specific research content and innovation are as follows:1.Proposed hierarchical cloud platform architecture based on hardware trusted support layer,virtual trusted layer and system functional layer.Combined with the trusted needs of the cloud platform,through the integration of user configuration and user abnormalities evaluation mechanism to ensure that users and cloud platform two-way credible,virtual machine design dynamic trust protection mechanism to solve the virtual machine running security issues.2.Designed a user-friendly trusted virtual machine.Based on the trusted cloud platform three-tier architecture,the user-friendly trusted virtual machine is designed to build the virtual TPM(uTPM)containing the user's security configuration requirements by adding the user policy loading module in the privileged domain,and then according to the idea of trusted computing To meet the user's security needs of the trusted virtual machine to achieve the flexibility of the user security configuration;through the development of user abnormal operation of the grading mechanism to check the user behavior and its abnormal rating,to achieve the user abnormal operation of fine-grained management.3.Aiming at the problem that the virtual machine system may be attacked during the dynamic operation,a virtual credible dynamic measurement model(VMPTM)based on uTPM is proposed.VMPTM takes the process as the research object,through the analysis of its structural characteristics,association,static characteristics,dynamic attack characteristics and other related information,the development of credible rules and measurement strategies tooptimize the dynamic measurement strategy,to ensure the credibility of the measurement based on the effectiveness,To maximize the efficiency of measurement.Based on the idea of object encapsulation,the credible rule base is constructed,and the credible rule base is protected by uTPM,and an efficient dynamic mechanism of virtual machine runtime is established.4.Design the VMPTM model implementation process,The concBAKe implementation method and implementation technology of each process are given,and the state measurement of each measurement object is made by using the credible measurement strategy.The credibility of the object is verified by the credible rules in the credible rule base.In the basic experimental environment to verify the VMPTM model in the attack state of the effectiveness of the test model to implement the performance load.
Keywords/Search Tags:Trusted cloud platform, User oriented, Trust metric, Trusted rule, Measurement strategy
PDF Full Text Request
Related items