期刊文献+

IaaS环境下虚拟机无代理通信加密机制 被引量:3

Agentless communication encryption framework for virtual machine in IaaS environment
下载PDF
导出
摘要 针对Iaa S(infrastructure as a service)环境下虚拟机通信数据在共享网络基础设施中的安全性问题,提出了一种虚拟机无代理通信加密机制。该机制通过加载于虚拟化节点内的加密模块与平台统一加密控制器间的协作,实现了Iaa S环境下虚拟机通信无代理按需加密;同时,引入通信加密策略有效性保障机制,保障了虚拟机全生命周期内的通信加密策略有效性。实验结果表明,该机制在引入较小性能开销的前提下,可以有效实现虚拟机通信加密,并保障虚拟机全生命周期内加密策略的有效性。 To ensure the security of communication data of virtual machine in Iaa S environment adopting shared network infrastructure,this paper proposed an agentless communication encryption framework for virtual machine in Iaa S environment.Through the cooperation between an encryption module which was loaded in virtualization node and a platform unified encryption controller,it implemented the agentless communication encryption for virtual machine in Iaa S. Moreover,this paper developed a mechanism for effectiveness of communication encryption policy to ensure the effectiveness of communication encryption policy in the whole life cycle of virtual machine. The results show that the framework can encrypt communication data of virtual machine on-demand and ensure the effectiveness of encryption policy in the whole life cycle of virtual machine,while introducing a few overhead.
出处 《计算机应用研究》 CSCD 北大核心 2016年第3期855-859,共5页 Application Research of Computers
基金 国家科技支撑计划资助项目(2012BAH18B05)
关键词 云计算 基础设施即服务 数据安全 加密 生命周期 cloud computing IaaS data security encryption life cycle
  • 相关文献

参考文献17

  • 1Zissis D, Lekkas D. Addressing cloud computing security issues[J] . Future Generation Computer Systems, 2012, 28(3):583-592.
  • 2Jansen W, Grance T. Guidelines on security and privacy in public cloud computing[M] //NIST Special Publication. [S. l.] :CreateSpace Independent Publishing, 2014.
  • 3Brunette G, Mogull R. Security guidance for critical areas of focus in cloud computing v3. 0[M] . San Francisco:Cloud Security Alliance, 2011.
  • 4Brodkin J. Gartner:seven cloud-computing security risks[EB/OL] . (2008-07-02). http://www/idi/ntnu. no/emner/tdtbo/papers/Cloud. Computing_Security_Risk. pdf.
  • 5Amazon. Amazon Web services:overview of security processes[EB/OL] . http://media. amazonwebservices. com/pdf/AWS_Security_Whitepaper. pdf.
  • 6Aliyun. 阿里云安全白皮书v1. 2[EB/OL] . (2014-03-25). http://help. aliyun. com/view/13444123. html.
  • 7Mahjoub M,Mdhaffar A,Halima R B,et al. A comparative study of the current cloud computing technologies and offers [ C ]//Proc of the1st International Symposium on Network Cloud Computing and Appli- cations. [S. 1. ] :IEEE Press,2011:131-134.
  • 8Sood S K. A combined approach to ensure data security in cloud computing[J] . Journal of Network and Computer Applications, 2012, 35(6):1831-1838.
  • 9Sumter L Q. Cloud computing:security risk[C] //Proc of the 48th Annual Southeast Regional Conference. New York:ACM Press, 2010:112.
  • 10Gentry C. Fully homomorphic encryption using ideal lattices[C] //Proc of the 41st Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009:169-178.

二级参考文献3

  • 1Jin Yang,Cilin Wang,Caiming Liu,Le Yu.Cloud Computing for Network Security Intrusion Detection System[J].Journal of Networks.2013(1)
  • 2Jianhua Che,Yamin Duan,Tao Zhang,Jie Fan.Study on the Security Models and Strategies of Cloud Computing[J].Procedia Engineering.2011
  • 3Dimitrios Zissis,Dimitrios Lekkas.Addressing cloud computing security issues[J].Future Generation Computer Systems.2010(3)

同被引文献17

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部