期刊文献+

基于BLP的虚拟机多级安全强制访问控制系统设计与实现 被引量:8

Design and Implementation on Multilevel Security Mandatory Access Control System for Virtual Machine Based on BLP
下载PDF
导出
摘要 多级安全是一种支持不同权限的用户和资源同时访问系统,同时确保用户和资源都只能访问其有权访问的信息的机制。在云计算中,不同用户或企业的虚拟机可能运行在同一台物理主机上,它们通常具有不同的安全等级,因此实现多级安全访问控制对保护虚拟机间的通信非常有意义。针对这一问题,文章通过对传统的BLP安全模型的模型元素、安全公理和状态转换规则进行修改,构建了适用于虚拟机环境的强制访问控制安全模型,借助SELinux技术,通过共享内存和授权表的方式实现了虚拟环境中的多级安全强制访问控制,有效增强了虚拟机之间、虚拟机与宿主机之间的访问的安全性。 Multileve l security is a mechanism that supports the simultaneous access o f users and resources w ith different privileges, w hile ensuring that both users and resources can access the inform ation that they have access to. In the cloud computing, the virtual machines that belonging to different users or enterprises may run on the same physical host, usually they have different levels o fsecurity. So it is very meaningful to implement m ultilevel secure access control policy to protect thevirtual machine communication. In reaction to the phenomenon, mandatory access control security modelthat suitable fo r the virtual machine environment was b u ilt by m odifying the model elements, security axioms and state transition rules o f the traditional BLP security model. By using SELinux technology through shared memory and authorization table way, the m ultilevel security mandatory access control in the virtual environment was realized, that effectively enhance access security between the virtual machine and virtual machine w ith the host machine.
作者 池亚平 姜停停 戴楚屏 孙尉 CHI Yaping;JIANG Tingting;DAI Chuping;SUN Wei(Communication Engineering Department, Beijing Electronic Science and Technology Institute, Beijing 100070,China;School of Communications Engineering, Xidian University, XVan Shaanxi 710071, China)
出处 《信息网络安全》 2016年第10期1-7,共7页 Netinfo Security
基金 北京市自然科学基金[416307] 中央高校基本科研业务费[328201537]
关键词 云计算 虚拟机 BLP 强制访问控制 cloud computing virtual machine BLP mandatory access control
  • 相关文献

参考文献10

二级参考文献192

  • 1蔡谊,郑志蓉,沈昌祥.基于多级安全策略的二维标识模型[J].计算机学报,2004,27(5):619-624. 被引量:28
  • 2季庆光,卿斯汉,贺也平.一个改进的可动态调节的机密性策略模型[J].软件学报,2004,15(10):1547-1557. 被引量:33
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4樊亚军,刘久文.TPM安全芯片设计与实现[J].信息安全与通信保密,2007,29(6):136-137. 被引量:5
  • 5张旻晋 桂文明 苏递生 等.从终端到网络的可信计算技术.信息技术快报,2006,4(2):21-34.
  • 6Na Zeng, Xiaolong Zhang, Hong Zhang. Intramural Network Intrusion Detection by Monitoring User Behavior [ C ]//Second International Symposium on Knowledge Acquisition and Modeling. 2009:178 -181.
  • 7All Foroughifar, Mohammad S Abadeh, A Momenzadeh, et al. Misuse Detection via a Novel Hybrid System [ C ]//Third UKSim European Symposium on Computer Modeling and Simulation. 2009:11 -16.
  • 8Sho Ohtahara, Takayuki Kamiyama, Yoshihiro Oyama. Anomaly-based Intrusion Detection System Sharing Normal Behavior Databases among Different Machines [ C ]//IEEE Ninth International Conference on Computer and Information Technology. 2009:217 - 222.
  • 9Lizhong Geng, Huibo Jia. An Intrusion detection system for network storage based on system calls [ C ]//Fifth International Conference on Information Assurance and Security. 2009:544-547.
  • 10Mark E. Russinovich, David A Solomon, Alex lonescu.深入解析Win-dows操作系统[M].人民邮电出版社,2009.

共引文献402

同被引文献61

引证文献8

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部