Font Size: a A A

Research On Theory And Method Of Internal Storage Security Isolation In XEX Virtual Machine

Posted on:2022-06-15Degree:MasterType:Thesis
Country:ChinaCandidate:Z WangFull Text:PDF
GTID:2518306527477214Subject:Computer technology
Abstract/Summary:PDF Full Text Request
This paper studies the theory and method of safe memory isolation of Xen virtual machine.Based on the analysis of cloud computing,virtualization technology,the theory and methods and security architecture model based on the thorough analysis principle and Flask Xen virtualization security framework of related theory and technology,in view of the current cloud computing,virtualization technology facing the security risks,especially the access control security problems,put forward a kind of security isolation and identification methods based on memory,In order to effectively protect the security risks caused by access,provide a safe and effective protection mode for the reliable operation of cloud computing.Firstly,this paper introduces the virtual isolation of Xen memory.There are still many shortcomings in the memory isolation mechanism provided by Xen,which cannot achieve complete isolation in a real sense.Therefore,the memory security isolation scheme of user computer can use the testing tool of memory access bandwidth to test the performance of the improved memory access,and use SSL as the authentication mechanism.Secondly,it deeply analyzes the Flash security architecture,and thinks that the Flash security architecture emphasizes the access control policy of the role.However,it is role-based authentication,as well as SSL authentication under the Xen architecture,that may result in a collision of identities,resulting in a collision pool of access data.At the same time,this paper analyzes the Open Stack cloud platform in terms of data encryption during identity authentication,low data authorization,component invocation efficiency,and low database utilization rate,and improves the identity authentication mechanism scheme of Open Stack mechanism under multi-tenant.Finally,in order to effectively avoid access collision pool,this paper proposes a hybrid access control strategy based on SSL and RBAC,and studies the secure access control strategy under multi-tenant conditions,including the key technology research of memory isolation and the combination strategy of SSL and RBAC.Simulation results show that the hybrid strategy can effectively avoid access collision pool,and provides a new way to solve the security policy problem of multi-user access control in cloud computing.
Keywords/Search Tags:Access control, Virtualization, Xen architecture, Memory isolation
PDF Full Text Request
Related items