天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

云計(jì)算中虛似機(jī)鏡像管理研究

發(fā)布時(shí)間:2018-09-06 15:10
【摘要】:“云計(jì)算”的概念自從2006年被提出以后,迅速成為IT領(lǐng)域最令人振奮的研究熱點(diǎn),受到了工業(yè)界和學(xué)術(shù)界廣泛的關(guān)注。云計(jì)算提出至今,已經(jīng)在國(guó)內(nèi)外得到了快速的發(fā)展。隨著云計(jì)算應(yīng)用的不斷推廣,關(guān)于虛擬化管理及其安全問(wèn)題日趨重要,并且成為制約云計(jì)算進(jìn)一步發(fā)展的首要因素。Google, Amazon等發(fā)起者不斷爆出安全事故更加劇了人們對(duì)云計(jì)算的擔(dān)憂。例如2009年Amazon EC2遭到阻斷的服務(wù)攻擊,Google電子郵件服務(wù)中斷等。因此,要讓企業(yè)大規(guī)模采用云計(jì)算平臺(tái),放心地將企業(yè)數(shù)據(jù)放到云中,必須首先解決云計(jì)算所面臨的安全上的問(wèn)題。laaS云服務(wù)商通常是以提供獨(dú)立的虛擬機(jī)方式為用戶提供服務(wù),用戶通過(guò)遠(yuǎn)程的方式管理虛擬機(jī)。提供虛擬機(jī)有利于降低用戶的IT成本,提高云提供商的資源利用率和管理能力,這種方式也存在許多安全問(wèn)題。由于虛擬機(jī)的創(chuàng)建成本較低,用戶往往為不同的任務(wù)創(chuàng)建不同的虛擬機(jī)。此外,用戶可以克隆、快照、甚至可以回滾到以前的狀態(tài)。雖然這些功能為用戶提供了極大的靈活性,但它們對(duì)云平臺(tái)成了的巨大安全風(fēng)險(xiǎn)。例如,一臺(tái)虛擬機(jī)回滾,之前的安全漏洞又重新出現(xiàn)了。而且隨著云計(jì)算應(yīng)用的深入發(fā)展,會(huì)有越來(lái)越多的虛擬機(jī)出現(xiàn),這種現(xiàn)象被稱為虛擬機(jī)蔓延,使得虛擬機(jī)管理與軟件更新成為一件非常費(fèi)時(shí)的任務(wù)。云計(jì)算平臺(tái)提供商將虛擬機(jī)系統(tǒng)更新任務(wù)交給用戶自己負(fù)責(zé),而用戶迫切期望供應(yīng)商來(lái)完成這項(xiàng)任務(wù)。結(jié)果就導(dǎo)致大量的虛擬機(jī)(運(yùn)行或休眠)由于沒(méi)有及時(shí)進(jìn)行軟件漏洞修復(fù)而受到大量的安全威脅,降低了系統(tǒng)的安全性。本文針對(duì)云計(jì)算環(huán)境中虛擬機(jī)鏡像管理問(wèn)題進(jìn)行了深入的分析和研究。首先分析了云計(jì)算環(huán)境下虛擬機(jī)鏡像文件管理中存在的一些問(wèn)題,并針對(duì)這些問(wèn)題提出基于通用配置管理工具、源跟蹤機(jī)制和版本庫(kù)維護(hù)服務(wù)的虛擬機(jī)鏡像文件管理策略,該策略可為虛擬機(jī)鏡像文件管理提供靈活的解決方案。接著設(shè)計(jì)和實(shí)現(xiàn)了虛擬機(jī)鏡像管理系統(tǒng),并通過(guò)實(shí)際的實(shí)施環(huán)境比較和驗(yàn)證了該解決方案的有效性和高效性。
[Abstract]:Since it was proposed in 2006, the concept of "cloud computing" has rapidly become the most exciting research hotspot in the field of IT, and has attracted extensive attention from industry and academia. Cloud computing has been developed rapidly at home and abroad. With the continuous promotion of cloud computing applications, virtualization management and its security issues become increasingly important, Google, Amazon and other sponsors continue to burst out security incidents, which have increased people's concern about cloud computing. For example, Amazon EC2 was blocked in 2009 service attacks on the interruption of email services, and so on. Therefore, in order to allow enterprises to adopt cloud computing platform on a large scale and to put enterprise data in the cloud, we must first solve the security problems faced by cloud computing. LaaS cloud service providers usually provide services to users in the form of independent virtual machines. Users manage virtual machines remotely. Providing virtual machines can reduce the IT cost of users and improve the resource utilization and management ability of cloud providers. There are also many security problems in this way. Because of the low cost of creating virtual machines, users often create different virtual machines for different tasks. In addition, the user can clone, snapshot, and even roll back to the previous state. While these features provide users with great flexibility, they pose a significant security risk to cloud platforms. For example, a virtual machine rolls back and a previous security flaw reappears. With the further development of cloud computing applications, more and more virtual machines will appear. This phenomenon is called virtual machine spread, which makes virtual machine management and software update a very time-consuming task. Cloud computing platform providers hand over the task of virtual machine system update to the users themselves, and users are eager for the vendors to complete this task. As a result, a large number of virtual machines (running or dormant) are threatened by a large number of security threats due to the failure to repair the software vulnerabilities in time, which reduces the security of the system. In this paper, the problem of virtual machine mirror management in cloud computing environment is deeply analyzed and studied. This paper first analyzes some problems in virtual machine mirror file management in cloud computing environment, and proposes a virtual machine mirror file management strategy based on general configuration management tool, source tracking mechanism and version library maintenance service. This strategy can provide a flexible solution for virtual machine image file management. Then the virtual machine mirror management system is designed and implemented, and the effectiveness and efficiency of the solution are verified by comparing the actual implementation environment.
【學(xué)位授予單位】:復(fù)旦大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2013
【分類號(hào)】:TP302

【參考文獻(xiàn)】

相關(guān)期刊論文 前1條

1 孫瑞鋒;趙政文;;基于云計(jì)算的資源調(diào)度策略[J];航空計(jì)算技術(shù);2010年03期

,

本文編號(hào):2226735

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/jisuanjikexuelunwen/2226735.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶c9290***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請(qǐng)E-mail郵箱bigeng88@qq.com
色婷婷成人精品综合一区| 91天堂素人精品系列全集| 日本久久精品在线观看| 日本加勒比不卡二三四区| 欧美午夜视频免费观看| 午夜色午夜视频之日本| 东北老熟妇全程露脸被内射| 亚洲精品欧美精品一区三区| 亚洲精品中文字幕熟女| 国产成人精品国内自产拍| 视频在线播放你懂的一区| 日韩一区二区免费在线观看| 激情综合五月开心久久| 国产精品激情在线观看| 四季精品人妻av一区二区三区| 国产精品欧美在线观看| 国产精品一区二区视频| 91精品国产综合久久福利| 国产精品涩涩成人一区二区三区 | 欧美夫妻性生活一区二区| 成人免费高清在线一区二区| 日本加勒比在线观看不卡| 日韩精品一区二区一牛| 丰满人妻一二区二区三区av| 欧美日韩国产成人高潮| 一区二区三区免费公开| 91欧美亚洲精品在线观看| 国产一区二区三区四区免费| 久久精品国产亚洲av麻豆尤物| 午夜精品久久久99热连载| 国产熟女高清一区二区| 男人大臿蕉香蕉大视频| 亚洲欧美日韩另类第一页| 国产精品一区二区香蕉视频| 欧美日韩一区二区综合| 久久永久免费一区二区| 国产欧美韩日一区二区三区| 黄片在线免费观看全集| 少妇人妻一级片一区二区三区| 激情视频在线视频在线视频 | 免费观看日韩一级黄色大片|