Font Size: a A A

Research On Dynamic Migration Access Control Of Virtualized Encryption Card

Posted on:2021-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:D J KongFull Text:PDF
GTID:2518306104988499Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
In recent years,cloud computing has made tremendous progress in technology development and market applications.Virtualization is a basic technology that supports cloud computing with high reliability,high security,and high elasticity indicators.Virtualization can make full use of hardware resources and improve the operational efficiency and reliability of services,but it also creates security risks of sharing and interconnection.In particular,the virtualization and dynamic migration of proprietary hardware puts forward higher requirements for cloud computing platforms.By analyzing the problems of encryption card virtualization and dynamic migration,the access control mechanism of the virtual encryption card migration process is deeply studied.The problem of dynamic migration of multiple virtual encryption cards is of great research value in both academic and industrial applications.Multi-virtual encryption card dynamic migration security issues include the credibility of the identity of the migration participants,the consistency of the encryption site before and after the migration,and the security of the migrated data.By improving the RBAC and BLP models,a multi-virtual encryption card dynamic migration access control model is designed to provide security guarantees in user identity authentication,virtual machine multi-security classification,encryption card migration process control,and migration data flow protection.The model solves three problems.The first is multi-virtual encryption card state saving and restoration,using Virt-io to virtualize the migration process of multiple encryption card devices;the second is the security protection of the migration process,using authentication and negotiation mechanisms to ensure the identity of the migration participants Legitimacy,the use of encryption protocols to ensure the security of migrated data;Finally,the access control of the migration process,the design of a system model that guides the migration process by the security model,abstractly maps the system state at each stage of the migration to the state transition rules of the security model to ensure the system The safety of the running state.The security of the access control model and the authentication protocol is proved through theoretical analysis.The process of dynamic migration of multiple virtual encryption cards under the guidance of the security model is simulated through experiments.Compared with the migration overhead without protection mechanism,the security model has a lower The performance overhead makes this work practical and feasible.
Keywords/Search Tags:I/O virtualization, Dynamic igration, Access ontrol, Multiple virtual encryption cards, Multiple security levels
PDF Full Text Request
Related items