Font Size: a A A

Research And Application Of Data Center Virtualization Security

Posted on:2018-10-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y B LinFull Text:PDF
GTID:2428330542476888Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the development of information technology,data center construction and rent is paid more and more attention.Because of the realization of system integration and data sharing between application systems,to provide effective data storage and utilization for the enterprise,more and more enterprises with the data center to expand their business.But in the actual management process.Because of a huge number of data center hardware,there are low rates of resource utilization,maintenance management level is not high,data backup difficulties and many safety problems.To solve these problems,the application of virtualization technology for data center has brought a turning point.The virtualization technology to improve the utilization of resources,simplifying the infrastructure construction,effectively reduce the the company's operating costs,and enhance the performance of the system.The virtualization technology brings convenience to the traditional security protection technology challenges,virtual machine sprawl,virtual Virtual machine hopping,virtual machine escape,denial of service attacks and management platform vulnerabilities have brought security risks to the virtual environmentThe security mechanism of trusted computing hardware platform in virtual environment.The trusted platform module is the system integrity measurement and anti tampering function on chip,based on trusted platform module,to establish credibility and realize the amount of root transfer can guarantee the dynamic trust chain of trusted security platform of trusted computing technology and virtual.Technology complement each other,common process virtual machine virtual environment of data center migration to provide security.On the one hand,the isolation between virtual machines using virtualization technology,to make up for the primary system safety defects due to lack of isolation,and effectively solves the application of trusted computing technology in the original system generated the problem;on the other hand,the trusted computing technology to achieve a virtual machine on its integrity and confidentiality protection,credibility and integrity of the virtual platform for Good protectionThis paper presents a design scheme of virtual machine migration security framework,imitation hardware trusted platform module,the migration process of virtual machine based on virtual trusted platform module for dynamic security protection.The trusted Trust Center Construction of the security of virtual machine data center for unified management,the use of transponders,passing through the trusted root structures and the trusted chain of trust,the attacker can avoid virtual machine running process to modify user data,effectively ensure the integrity of the data,using the vTPM security transfer protocol can effectively reduce the risk of the user virtualization platform.Finally,this paper based on the VMware virtual software was used to simulate the entire program,effective protection of virtual trusted platform module on migration of virtual machine was simulated by setting up virtual environment,show the virtual trusted platform module can achieve cross platform full migration.
Keywords/Search Tags:Data Center, Virtualization, Trusted Computing, Virtual Machine Migration
PDF Full Text Request
Related items