期刊文献+

云环境下基于BN模型的虚拟机安全部署模型 被引量:2

BN Model Based Virtual Machine Security Deployment Policy in Cloud Computing
下载PDF
导出
摘要 针对云计算环境下多用户共享硬件资源带来的安全风险,提出了虚拟机安全部署模型CVDBN,基于BN模型设计了安全部署规则,以满足云计算环境下利益冲突用户对于虚拟机部署的安全隔离需求。最后设计了虚拟机安全部署模块和安全部署算法。仿真实验结果证明了该模型和算法的有效性和可用性。 CVDBN security deployment model of virtual machine was proposed in allusion to security risk caused by multiple consumers' sharing hardware resource in the environment of cloud computing and the security rules of subject server to deploy the object virtual machines were designed based on BN model,which can meet users' isolation require ment on deployment of virtual machines with interest conflict. In the end, the security module of deploying virtual ma- chines and the security algorithm of deploying virtual machines were designed. Simulation was conducted which demon- strates the effectiveness and availability of the model and algorithm proposed in this context.
出处 《计算机科学》 CSCD 北大核心 2013年第3期210-214,共5页 Computer Science
基金 武器装备预研重点基金项目(9140A15060311JB5201)资助
关键词 云计算 安全 虚拟机 BN模型 利益冲突 服务器安全禁忌列表 Cloud computing, Security, Virtual machine, BN model, Conflict of interest, Security taboo list of servers
  • 相关文献

参考文献9

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 2Brewer D F C,Nash M J.The Chinese Wall Security Policy[C] //Proceedings of the 1989 IEEE Symposium on Security and Privacy.Oakland,CA,USA,1989.
  • 3Bell D E,LaPadula L.Secure Computer System:Unified Exposition and Multics Interpretation[R].ESD-TR-75-306.Electronics Systems Division,AFSC,Hanscom AF Base,Bedford MA,1976.
  • 4Biba K.Integrity Considerations for Secure Computer System[R].MTR-3153.The MITRE Corporation,Bedford,MA,1977.
  • 5Hay B,Nance K,Bishop M.Storm Clouds Rising:Security Challenges for IaaS Cloud Computing[C] //Proceedings of the 44thHawaii International Conference on System Sciences.Hawaii,US,2011.
  • 6Wu Ruo-yu,Ahnl G-J,Hul Hong-xin,et al.Information Flow Control In Cloud Computing[C] //Collaborative Computing:Networking,Applications and Worksharing.Chicago,Illinois,USA,2010.
  • 7林果园,贺珊.一种云计算环境下的安全模型[J].电信科学,2010,26(9):95-99. 被引量:6
  • 8Reuben J S.A Survey on Virtual Machine Security[Z].Seminar on Network Security.
  • 9Ristenpart T,Tromer E,Shacham H,et al.Get Off of My Cloud:Exploring Information Leakage in Third-Party Compute Clouds[C] //Proceedings of the 16th ACM Conference on Computer and Communications Security.Chicago,Illinois,USA,November 2009.

二级参考文献31

  • 1何永忠,李晓峰,冯登国.RBAC实施中国墙策略及其变种的研究[J].计算机研究与发展,2007,44(4):615-622. 被引量:10
  • 2罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 3Michael M. Cloud computing: web-based applications that change the way you work and collaborate online, 2009.
  • 4Brewer D, Nash M. The Chinese wall security policy. In: Proc of the IEEE Symposium on Research in Security and Privacy, Los Alamitos, 1989.
  • 5Bell K, LaPadula L J. Secure computer systems: unified exposition and muhics interpretation. MITRE Corporation ,Tech Rep: MTR-2997, 1976.
  • 6Biba K J. Integrity considerations for secure computer systems. Technical Report MTR 3153. The Mitre Corporation, 1977.
  • 7Clark D, Wilson D. A comparison of commercial and military security policies. In: Proc of the '87 IEEE Symp on Security and Privacy, 1987.
  • 8Philip W L Fong. Access control by tracking shallow execution history. In: Proc of the 2004 IEEE Symp on Security and Privacy, Los Alamitos, 2004.
  • 9Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 10Distributed Management Task Force (DMTF) http://www.dmtf.org/home.

共引文献1076

同被引文献8

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部