期刊文献+

基于虚拟机的多个安全级别的日志生成方法

Multi-level security logging for files using multi-virtual machines
原文传递
导出
摘要 该文的研究目的是提高日志在计算机系统中安全,为数据追踪和分析提供数据的修改情况的可靠依据。与数据类似,日志也有不同的安全级别(SL)。当不同权限的访问者做日志分析、审计等工作时,需要不同SL的日志,可以用多个虚拟机(VM)得到多个SL的数据文件日志。为此,根据数据文件受保护程度,把它们隔离存放在多个SL的工作VM内。当数据文件被访问时,用虚拟机监视器截取每个访问操作,并在日志VM内生成相应的日志。由于工作VM的SL不同,对应的日志VM的SL不同,所得到的日志的SL也各不相同。当VM之间共享文件或者由工作VM向日志VM传递数据时,访问控制模块按规则控制数据的流向。在带有sHype的虚拟机监视器xen的基础上所做实验表明:用多个VM生成多级安全日志的方法对数据文件访问性能的影响比较低。 This paper aims to improve log security in computer systems, with trustful logs then provided to data tracing and analyses with collected modification information. Logs can be in different security levels (SLs) as for data. When users do work such as log analyses and auditing, there should be logs in different security levels. Virtual machines (VMs) can be used to represent different security levels i. e. they can be used to generate system logs and keep the logs in virtual machines with different security levels. With the data files being accessed, the virtual maehine monitor intercepts the operations from the working virtual machines and generates logs in logging virtual machines. When working virtual maehines are in differen~ security levels, the logs are a/so divided into different security levels. If the files are shared among virtual maehines or the data might be transferred from the working virtualmachine to the logging virtual machine, the access control module controls the data transfer based on the predefined access rules. Experiments on the virtual machine monitor xen with sHype show that producing the multi-SL log of data files causes fewer losses in system performance.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2013年第2期227-233,共7页 Journal of Tsinghua University(Science and Technology)
基金 国家"九七三"重点基础研究项目(2007CB310900) 国家"八六三"高技术项目(2008AA01Z112) 国家自然科学基金资助项目(60973143)
关键词 数据文件 日志 虚拟机 安全级别 data file log virtual machine (VM) security level (SL)
  • 相关文献

参考文献14

  • 1Peterson Z N J, Burns R,Ateniese G,et al. Design andimplementation of verifiable audit trails for a versioning filesystem [C]// Proceedings of the 5th USENIX Conference onFile and. Storage Technologies. Berkeley, CA, USA :USENIX Association, 2007 : 93 - 106.
  • 2Santry D S, Feeley M J, Hutchinson N C, et al. Decidingwhen to forget in the Elephant file system [J]. ACM S1GOPSOperating Systems Review , 1999,33(5) : 110 - 123.
  • 3nCipher Corp. nCipher Hardware Security Module [EB/OL].[2010-01-01]. http: //www. ncipher. com/hardware-security-module. html.
  • 4Haubert E,Tucek J, Brumbaugh L, et al. Tamper-resistantstorage techniques for multimedia systems [C]// IS& T/SPIESymposium Electronic Imaging Storage and RetrievalMethods and Applications for Multimedia. San Jose, CA,USA, 2005: 30 -40.
  • 5Madnick S E,Donovan J J. Application and analysis of thevirtual machine approach to information system security andisolation [C]//Proceedings of the Workshop on VirtualComputer Systems. New York: ACM, 1973 : 210 - 224.
  • 6Zhao S Q,Chen K,Zheng W M. Secure logging for auditablefile system using separate virtual machines [C]//IEEEInternational Symposium on Parallel and DistributedProcessing with Applications. Los Alamitos,CA, USA:IEEE Computer Society, 2009 : 153 - 160.
  • 7Berger S, Caceres R, Goldman K A, et al. vTPM:Virtualizing the trusted platform module [C]//Proceedings ofthe 15th Conference on USENIX Security Symposium. Berkeley,CA, USA: USENIX Association, 2006: Article No 21.
  • 8Garfinkel T,Pfaff B,Chow J,et al. Terra: A virtualmachine-based platform for trusted computing [J]. ACMSIGOPS Operating Systems Review,2003,37(5) : 193 -206.
  • 9From Wikipedia,the free encyclopedia. Multilevel security[EB/OL]. [2009-12-01]. http: //en. wikipedia. org/wiki/Multilevel_security.
  • 10Barham P,Dragovic B, Fraser K, et al. Xen and the art ofvirtualization [C]//Proceedings of the 19th ACM Symposiumon Operating Systems Principles. Bolton Landing, NY,USA; ACM, 2003: 164 - 177.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部