Font Size: a A A

Virtual Machine Safety And Data Protection Of Cloud Computing

Posted on:2019-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:C D SongFull Text:PDF
GTID:2428330563953244Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
In recent years,the foundation of cloud computing,virtualization technology,has been widely used in various fields,and more effectively uses the hardware performance of the computer.The conventional computing model,which was widely used before,is gradually changing into the computing model of cloud computing.While improving the efficiency of the calculation,it also brings a lot of security problems.For example,user data leakage of Google Corporation's Gmail mailbox service,erroneous operation in Ali cloud service resulted in data loss of TeamCola company,and a server in some area of Jingdong was attacked,resulting in partial user data leakage.Because of the above events,the problem of virtualization security has been widely concerned.More and more people have invested more research in cloud computing security.In the direction of many virtual machine security,Virtual Machine Introspection(VMI)has been widely concerned and applied by many teachers,students and developers in universities.Virtual machine technology is a kind of introspection to monitor the internal state of the virtual machine technology,but the difference is that technology is in the external virtual machine to arrange the monitoring program,so as to make full play of the advantages of system abstraction between virtual machine and virtual machine hardware isolation.In this paper,based on Virtual Machine Introspection(VMI)technology,this paper discusses the virtual machine software that can be monitored and gets the running state information of the monitored virtual machine by Xen virtual machine software.The VMI monitoring system is deployed on the relatively safe pure system virtual machine,which effectively improves the security of the monitoring virtual machine without affecting the original monitoring effect.Then the state of the system is monitored in real time,and the corresponding real-time information is obtained.Through VMI technology and software behavior analysis,the virtualization platform can effectively utilize the advantages of high resource utilization and high isolation.The main contents of this paper are as follows: 1.Through the research of virtual machine introspection technology,this paper expounds the principle and implementation method of virtual machine introspection technology,and introduces the research status of virtual machine introspection technology in various fields.2.The advantages and disadvantages of the security monitoring of the current virtual machine are analyzed,and the security monitoring of the virtual machine based on VMI technology is explored.The main aspects of the malicious software are analyzed.3.In this study,the Xen platform is configured in detail,and the virtual machine data and status information are monitored by using the interface functions in XenAccess and other libraries,and the software behavior is analyzed.4.Through the experiment,we analyze the collected experimental monitoring data,and draw the conclusion that the software operation affects the system.
Keywords/Search Tags:Cloud Computing, Virtulization, VMI, Xen
PDF Full Text Request
Related items