Font Size: a A A

Research On Key Technologies Of Mimic Orchestration In Cloud Environment

Posted on:2022-10-21Degree:MasterType:Thesis
Country:ChinaCandidate:S Y NiFull Text:PDF
GTID:2518306326494664Subject:Master of Engineering
Abstract/Summary:PDF Full Text Request
Cloud computing has been recognized by users with its powerful computing and storage capabilities,and cloud services have become the trend of industry application development.However,while cloud computing has brought great convenience to our lives,it also introduces new problems,such as virtual machines on the cloud that are more susceptible to attackers and unreasonable cloud resource allocation.Analyzing the current research status of cloud computing security and resource allocation,there are still three shortcomings: 1)In order to facilitate operation,maintenance and management,most current cloud providers adopt a static and homogeneous architecture.A static and homogeneous cloud computing environment is easy to become the target of attackers,increasing the possibility and harm of being attacked;2)In a mimic cloud system,in order to improve the security of the cloud computing environment,the cloud server will be heterogeneous and the virtual machine on the cloud will be dynamic.Dynamic rotation of virtual machines will change the location of deployed servers,affect system load balance and reduce system resource utilization;3)Although the current cloud platform can manage virtual machines,it is difficult to meet the needs of mimic cloud and cannot carry mimic applications.Based on mimic defense technology,this paper has carried out research on cloud computing resource allocation and application assembly technology,aiming to improve the security of cloud computing environment and improve the utilization of cloud computing resources.The main research results of this paper are divided into the following three aspects.1.Aiming at the security threats caused by the unknown vulnerabilities of software and hardware in the current cloud environment,based on the dynamic heterogeneous redundancy architecture of mimic defense,a mimic cloud resource allocation algorithm for different security levels is researched and proposed;the algorithm adapts to the needs of different users by dividing different security levels,and provides security protection for the differentiated service needs of cloud computing users;the experimental results show that mimic defense can effectively improve the reliability and security of the cloud computing environment,and resource allocation based on security levels can provide users provide differentiated services to improve resource utilization efficiency.2.Aiming at the problem that the rotation strategy in the mimic cloud system affects load balance and reduces resource utilization,based on the correlation between virtual machines and servers,the research proposes a multi-dimensional heterogeneous cloud resource allocation algorithm based on the rotation strategy;this algorithm abstracts the resources required to deploy the virtual machine and the available resources of the server as vectors,and selects the server to be deployed for the virtual machine by measuring the similarity between the vectors.By measuring the similarity between the vectors,the server to be deployed is selected for the virtual machine;experimental results show that the multi-dimensional heterogeneous cloud resource allocation algorithm based on the rotation strategy can improve the security of the virtual machine in the multi-dimensional heterogeneous boxing problem while ensuring higher resource utilization rate,reduce system load fluctuations.3.Aiming at the problem that the existing cloud computing environment deployment plan is difficult to meet the needs of mimicry defense,based on the Openstack platform,a mimic cloud system implementation plan is researched and designed;this plan uses heterogeneous servers to deploy heterogeneous cloud computing environments.As a cloud management platform,Openstack uses Glance service to create heterogeneous virtual machine images.Use Python to realize the automated deployment of mimic virtual machines.The experimental results show that system rotation will increase the response time of the system by 10%,but it will not affect the normal access of the system.Mimic defense can effectively resist attackers in real offensive and defensive scenarios and improve the cloud Computing environment security.
Keywords/Search Tags:Cloud Computing, Resource Allocation, Mimic Defence, Security, Heterogeneity, Rotation, Openstack, Cloud Platform
PDF Full Text Request
Related items