虛擬化環(huán)境下安全多級訪問控制機制研究與實現(xiàn)
[Abstract]:In today's society, information has become a very important strategic resource, so the information security and security ability of a country also becomes a good reflection of its comprehensive national strength. On the one hand, since the level of science and technology and information technology are at the stage of unprecedented prosperity, the information industry has become the first-largest industry in the world today; on the other hand, the frequency of the event of information security is increasing, and the problem of information security is urgent. With the development of the Internet, especially the emergence of network applications such as cloud computing and distributed system, people's life becomes more and more convenient because more and more data can be obtained from the network. As the people's dependence on the network is gradually enhanced, the security requirements of the data obtained in the network are becoming more and more high. At the same time, cloud computing provides a more open and more interactive network environment due to virtualization technology as one of the key technologies for building their infrastructure, and people are increasingly inclined to get all the required data and information from the cloud computing network. Because the cloud computing network is different from the traditional network system, and the traditional access control technology such as the firewall is difficult to prevent the attack of the active leakage and the malicious Trojan horse, the traditional access control technology cannot be completely applied to the virtualized environment. Therefore, how to enable the data in the virtualized environment to be fully shared and to realize the strict access control is a difficult problem to be overcome in the present time. In general, the security access control model for a conventional system is mainly controlled by setting user rights for data access. Such an access control mechanism makes the management control of the data excessively dependent on the user, resulting in an attack that causes the system to be attacked not only by some external attackers, but sometimes from some internal users. In order to overcome the disadvantages of this access control mechanism, the multi-level security model comes into being. The multi-level security model utilizes the management mechanism of the user and the data to separate the autonomous access control of the data to the mandatory access control, so that the security access control of the data is realized to a certain extent. So far, many multi-level security models have been used in different environments, such as army, commerce, etc., but often because of the inrationality and fuzziness of the model semantics, the utility support is not enough, and the application is not wide. In this paper, on the basis of multi-level relationship model MLR, a general-purpose entity-based multi-level relationship model E-MLR model is proposed. In the E-MLR model, we re-define the semantics and the statement operations to ensure secure isolation between different entities within a traditional network, as well as secure communications within the entity. Then, using the KVM virtual machine as the research reference environment, the E-MLR model is extended in the virtualized environment, and the virtual multi-level packet safety model V-MGSM is put forward for the data access security requirement between the virtual machines. The purpose of the invention is to group the virtual machine according to the corresponding entity, and is used for controlling different groups, and the communication process between the virtual machines in the same group and the memory sharing problem in the virtualized environment. On the basis of this, this paper gives the implementation of the access control mechanism in the KVM environment of the virtualization platform and the test results. It mainly includes the following contents: 1. Based on the MLR model, a general-purpose entity-based multi-level relationship model, E-MLR, is proposed to re-define the semantic of the data and put forward the idea of data borrowing. then, four general data operation instructions are defined so as to realize that the low-level user cannot modify the target of the high-level user view, and finally the purpose of system information security is achieved; The universal E-MLR model is extended into a virtualization system, and a secure access control mechanism for communication among virtual machines in a virtualized environment is established, a V-MGSM model is proposed and data interpretation, an integrity property, an operation instruction and a security certificate are provided; Under the KVM virtual machine platform, the implementation process and the test result of the virtual machine access control mechanism are given, and the result of the demonstration is that the V-MGSM model we propose is correct and safe.
【學位授予單位】:西安電子科技大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.08
【相似文獻】
相關期刊論文 前10條
1 鈕小勇;韓桂明;;訪問控制機制在數(shù)據(jù)庫中的應用研究[J];科技傳播;2010年21期
2 徐小龍;竇孝晨;;一種對等社區(qū)網(wǎng)絡多層次可靠訪問控制機制[J];計算機技術與發(fā)展;2011年04期
3 關德君;王吉;;基于角色的訪問控制機制在考試系統(tǒng)中的研究與應用[J];科技信息;2013年09期
4 鄭衛(wèi)斌,張德運,李勝磊;防火墻的動態(tài)訪問控制機制[J];計算機工程與應用;2003年32期
5 雷蕓;劉恒;;用動態(tài)代理實現(xiàn)網(wǎng)上考試系統(tǒng)的訪問控制機制[J];玉林師范學院學報(自然科學版);2007年03期
6 張志軍;郭淵博;劉偉;呂金娜;袁順;;容忍入侵服務器中組通信認證與訪問控制機制[J];計算機工程與設計;2009年21期
7 劉波;郭少輝;陳暉;王海濤;陳磊;;數(shù)據(jù)統(tǒng)一訪問中訪問控制機制的研究[J];軍事通信技術;2013年03期
8 趙洪彪;;訪問控制機制概述[J];計算機安全;2002年12期
9 韓蘭勝,劉輝;基于角色的訪問控制中角色的劃分[J];湖北工學院學報;2002年03期
10 黃昆;;認證和授權體系趨于統(tǒng)一[J];中國計算機用戶;2007年42期
相關會議論文 前4條
1 周鋼;;操作系統(tǒng)訪問控制機制的安全性分析和測試[A];第14屆全國計算機安全學術交流會論文集[C];1999年
2 尚衛(wèi)衛(wèi);張衛(wèi)民;;一種氣象領域的安全模型及其訪問控制機制[A];2010年全國通信安全學術會議論文集[C];2010年
3 吳波;戴躍發(fā);顧亞強;;SOA環(huán)境下訪問控制機制研究[A];中國電子學會第十六屆信息論學術年會論文集[C];2009年
4 周集良;王正華;;基于CIST的訪問控制器設計與實現(xiàn)[A];第十九次全國計算機安全學術交流會論文集[C];2004年
相關重要報紙文章 前4條
1 ;發(fā)布新框架以改善云服務[N];網(wǎng)絡世界;2013年
2 《網(wǎng)絡世界》記者 于翔;CA AppLogic 3.0快速構(gòu)建云應用[N];網(wǎng)絡世界;2012年
3 李瀛寰;3Com推出第三層無線LAN安全解決方案[N];中國計算機報;2000年
4 CPW記者 曾憲勇;Sinfor M5100-AC訪問控制機制完善[N];電腦商報;2005年
相關博士學位論文 前3條
1 程勇;云存儲中密文訪問控制機制性能優(yōu)化關鍵技術研究[D];國防科學技術大學;2013年
2 顏學雄;Web服務訪問控制機制研究[D];解放軍信息工程大學;2008年
3 涂山山;云計算環(huán)境中訪問控制的機制和關鍵技術研究[D];北京郵電大學;2014年
相關碩士學位論文 前10條
1 薛瑩芳;虛擬化環(huán)境下安全多級訪問控制機制研究與實現(xiàn)[D];西安電子科技大學;2014年
2 馬佳敏;基于固件的虛擬化系統(tǒng)集成訪問控制機制研究與實現(xiàn)[D];上海交通大學;2014年
3 李y浻,
本文編號:2363530
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2363530.html