期刊文献+

基于事件驱动机制的虚拟化故障检测恢复系统 被引量:3

Virtualization Fault Detection Recovery System Based on Event-driven Mechanism
下载PDF
导出
摘要 为解决虚拟化条件下云平台故障排除不及时的问题,在开源云平台Open Stack上设计并实现一种虚拟化故障检测恢复系统。该系统由GUI层、调度层、逻辑层和功能层组成,以事件驱动机制为核心,将系统中传递的信息作为事件按时序进行处理。以感知模块、策略模块、执行模块为主体,调用Open Stack API和Libvirt API实现与虚拟机管理层的交互。建立以信息获取、分析处理、故障恢复为主要内容的故障检测恢复体系,通过对云平台运行环境的实时检测,获取状态参数,根据策略对参数进行分析判断并制定应对措施,实现对故障的自动恢复。实验结果证明,该系统可以在无代理情况下对云平台进行实时检测和故障自动恢复,增强云环境的安全性,提升云平台的高可用性。 In order to solve the problem that the fault troubleshooting of cloud platforms is not timely,and guarantee the continuity of cloud services,this paper designs and implements a virtualization fault detection and recovery system based on event-driven mechanism,which is on the open-source cloud platform——OpenStack.The system is composed of GUI layer,scheduling layer logic layer and functional layer,and processes the information transmitted in the system by timing as an event on the basis of event-driven mechanism.It mainly uses perception module,policy module and execution module,which call OpenStack API and Libvirt API to interact with the management of virtual machines.The established fault detection recovery system mainly includes information acquisition,analysis and processing,fault recovery,and by real-time detection of the cloud platform ' s runtime environment,it can obtain state parameters,analyze the parameters and develop countermeasures according to established policy,and achieve automatic fault recovery.Experimental results show that the system can detect and recover cloud platforms' fault with agentless method /enhance the security of cloud environments,and improve the high availability of cloud platforms.
出处 《计算机工程》 CAS CSCD 北大核心 2015年第2期7-11,16,共6页 Computer Engineering
基金 国家"863"计划基金资助项目(2013AA12A206) 国家自然科学基金资助项目(41104010 91120002 61170026) 中央高校基本科研业务费专项基金资助项目(2042014kf0237)
关键词 OPEN Stack云平台 负载均衡 事件驱动机制 高可用性 虚拟化 云计算 OpenStack cloud platform load balancing event-driven mechanism high availability virtualization cloud computing
  • 相关文献

参考文献13

  • 1冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 2Zissis D,Lekkas D.Addressing Cloud Computing Security Issues[J].Future Generation Computer Systems,2012,28(3):583-592.
  • 3Varia J.Cloud Architectures-Amazon Web Service[EB/OL].(2009-03-01).http://acmbangalore,org/events/monthly-talk/may-2008-cloud-architecturesamazon-web-services.html.
  • 4林闯,苏文博,孟坤,刘渠,刘卫东.云计算安全:架构、机制与模型评价[J].计算机学报,2013,36(9):1765-1784. 被引量:321
  • 5陈海波,夏虞斌,陈榕.高可信、高扩展与高可用云计算平台的研究与展望[J].高性能计算发展与应用,2013,43(2):29-34.
  • 6Calzolari F,Arezzini S,Ciampa A,et al.High Availability Using Virtualization[J].Journal of Physics,2010,219(5).
  • 7Tate J,Kelley R,Maliska S R R,et al.IBM SAN Solution Design Best Practices for VMware v Sphere ESXi[Z].IBM Redbooks,2013.
  • 8Open Stack[EB/OL].(2014-02-01).http://www.openstack.org.
  • 9Litvinski O,Gherbi A.Experimental Evaluation of Open Stack Compute Scheduler[J].Procedia Computer Science,2013,19(1):116-123.
  • 10Sotomayor B,Montero R S,Llorente I M,et al.Virtual Infrastructure Management in Private and Hybrid Clouds[J].IEEE Internet Computing,2009,13(5):14-22.

二级参考文献104

  • 1林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 2樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 3罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 4张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1336

同被引文献21

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部