期刊文献+

虚拟机动态迁移中的安全分析 被引量:2

Security Analysis in Virtual Machine Live Migration
下载PDF
导出
摘要 网络计算与"云计算"兴起过程中,其基础技术虚拟化技术发展迅速。计算机虚拟化的动态迁移,是重要的虚拟化应用功能。基础的动态迁移协议较简单,存在安全可信的隐患。在Xen虚拟化的平台下,测试了现有虚拟化动态迁移组件的使用对动态迁移本身的性能影响,提供了基于网络嗅探及地址解析协议(address resolution protocol,ARP)欺骗技术的攻击方案,验证了其安全防护能力的不足,提出了解决方案。 During the development of network computing and cloud computing,virtualization grows up quickly as the base technology.Virtualization live migration is an important feature for applications based on virtualization.Basic live migration protocol is too simple,and security hazard exists.Based on Xen virtualization platform,the performance of existed security solutions and the influence to live migration of these solutions are tested.The weakness of existed solutions is shown by attack based on sniffer and address resolution protocol(ARP) spoofing.The idea of solving the new problem is given.
出处 《计算机科学与探索》 CSCD 2011年第5期452-457,共6页 Journal of Frontiers of Computer Science and Technology
基金 国家自然科学基金 No.90715030 90612018 60970008 国家重点基础研究发展规划(973) No.2007CB310900~~
关键词 虚拟机 动态迁移 安全问题 virtual machine live migration security problem
  • 相关文献

参考文献1

二级参考文献4

共引文献1

同被引文献20

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:253
  • 2IDC. Virtualization and multicore innovations disrupting the worldwide server market [ EB/OL ]. 2014. http ://www. idc. com/getdoc, jsp? containerId = prUS20609907.
  • 3Clark C, Fraser K, Hand S, et al. Live migration of virtual ma- chines[ C ]//Proc of 2nd symposium on networked systems de- sign and implementation. [ s. 1. ] : [ s. n. ] ,2005.
  • 4Duncan A, Creese S, Goldsmith M, et al. Cloud computing: in- sider attacks on virtual machines during migration [ C ]//Pro- ceedings of the IEEE international conference on trust, securi- ty and privacy in computing and communications. [ s. 1. ] : IEEE ,2013:493-500.
  • 5Navamani B, Yue C, Zhou X, et al. An analysis of the virtual machine migration incurred security problems in the cloud [ C]//Proceedings of the ASE security conference. [ s. 1. ] : [ s. n. ] ,2014.
  • 6Claycomb W R, Nicoll A. Insider threats to cloud computing: directions for new research challenges [ C ]//Proc of 36th an- nual computer software and applications conference. [ s. 1. ] : IEEE ,2012 :387-394.
  • 7Oberheide J, Cooke E, Jahanian F. Empirical exploitation of live virtual machine migration [ C ]//Proceedings of BlackHat DC convention. [ s. 1. ] : [ s. n. ] ,2008.
  • 8Wood T, Shenoy P, Venkataramani A, et al. Black- box and gray-box strategies for virtual machine migration [ C ]//Pro- ceedings of the 4th USENIX symposium on networked systems design and implementation. [ s. 1. ] :USENIX,207.
  • 9Santos N,Gummadi K P,Rodrigues R. Towards trusted cloud computing[ C ]//Proceedings of the USENIX workshop on hot topics in cloud computing. [ s. 1. ] : USENIX ,2009.
  • 10Wan X,Zhang X F,Chen L,et al. An improved vTPM migra- tion protocol based trusted channel[ C]//Proc of international conference on systems and informatics. [ s. 1. I : IEEE, 2012 : 870-875.

引证文献2

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部