天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當前位置:主頁 > 科技論文 > 計算機論文 >

Xen無干擾安全策略模型及安全機制研究

發(fā)布時間:2019-04-20 07:29
【摘要】:隨著計算機技術(shù)的發(fā)展,虛擬化技術(shù)作為云計算最重要的支撐技術(shù)成為近年來的研究熱點。在眾多虛擬化技術(shù)中,Xen以其優(yōu)越的性能和開源性受到業(yè)界廣泛認同。Xen是一種系統(tǒng)虛擬機(Systerm Virtual Machine,SVM),負責管理和控制系統(tǒng)中所有軟硬件資源,并為其上并發(fā)運行的多個虛擬機提供相互隔離的運行環(huán)境。但是,如果Xen被破壞,則會危及其上運行的所有虛擬機,造成嚴重的損失。因此,,Xen虛擬機安全就成為近年來研究的重點。 本文重點研究Xen虛擬機的安全策略模型和安全機制,主要工作有以下四點: 1、提出了一種最小特權(quán)無干擾安全策略模型(Non-inference Security Poliycy Model withLeast Privilege,LPNIM)。利用Roscoe無干擾理論和通信進程代數(shù)CSP(CommunicatingSequential Processes)對模型進行了形式化描述,并基于Roscoe惰性抽象、確定性及Schneider階函數(shù)等相關(guān)理論對模型的隔離和共享策略進行了形式化證明。該模型利用最小特權(quán)原則的思想,通過實施分區(qū)級和主體資源級兩級策略,使機密性無干擾安全策略模型和完整性無干擾安全策略模型有機結(jié)合,滿足了系統(tǒng)機密性、完整性和最小特權(quán)需求。 2、構(gòu)建了一個安全增強的Xen虛擬機體系結(jié)構(gòu)(Security-Enhanced Xen,SEXen)。SEXen基于LPNIM,對現(xiàn)有Xen體系結(jié)構(gòu)進行修改,增加了網(wǎng)絡(luò)域、可信啟動模塊(Trusted LaunchModule, TLM)和細粒度強制訪問控制模塊(Finer-grained Mandatory Access Control Module,F(xiàn)MACM)。SEXen簡化了Dom0特權(quán)域的操作,滿足了模型對可信度量能力和最小特權(quán)信息流控制能力的需求。 3、實現(xiàn)了從開機到虛擬機啟動的可信啟動機制;趧討B(tài)可信度量技術(shù),設(shè)計了啟動控制策略,保證了只有度量成功,且提供正確的密鑰時,才可以啟動虛擬機。該機制提供了對系統(tǒng)初始狀態(tài)完整性的保護,并阻止了SMM(System Management Mode)繞過攻擊。 4、實現(xiàn)了細粒度的信息流訪問控制機制。通過修改Xen Hypervisor內(nèi)核和Guest OS內(nèi)核,可以實現(xiàn)對虛擬機間和虛擬機內(nèi)部操作的控制,以保證只有在滿足虛擬機級和主體資源級兩級安全策略的前提下,上述操作才能執(zhí)行。該機制實現(xiàn)了最小特權(quán)信息流控制和安全策略的集中統(tǒng)一管理。
[Abstract]:With the development of computer technology, virtualization, as the most important supporting technology of cloud computing, has become a hot research topic in recent years. Among the many virtualization technologies, Xen is widely recognized by the industry for its superior performance and open source. Xen is a system virtual machine (Systerm Virtual Machine,SVM, which is responsible for managing and controlling all hardware and software resources in the system. It also provides an isolated running environment for multiple virtual machines running concurrently on the virtual machine. However, if Xen is destroyed, it will endanger all virtual machines running on it and cause serious losses. Therefore, Xen virtual machine security has become the focus of research in recent years. This paper focuses on the security policy model and security mechanism of Xen virtual machine. The main work is as follows: 1. A minimum privilege non-interference security policy model (Non-inference Security Poliycy Model withLeast Privilege,LPNIM) is proposed. The model is formally described by Roscoe non-interference theory and communication process algebra CSP (CommunicatingSequential Processes), and the isolation and sharing strategy of the model is formally proved based on Roscoe inert abstraction, certainty and Schneider order function. The model makes use of the principle of minimum privilege and implements the two-level policy of partition level and principal resource level, which combines the confidentiality non-interference security policy model and the integrity non-interference security policy model organically, and satisfies the confidentiality of the system. Integrity and minimum privilege requirements. 2, build a security enhanced Xen virtual machine architecture (Security-Enhanced Xen,SEXen). SEXen modifies the existing Xen architecture based on LPNIM, adding network domain and trusted boot module (Trusted LaunchModule,. TLM) and fine-grained mandatory access control module (Finer-grained Mandatory Access Control Module,FMACM). SEXen simplifies the operation of Dom0 privilege domain and satisfies the requirements of the model for trust measurement and minimum privileged information flow control. Thirdly, the trusted boot mechanism from boot to virtual machine is realized. Based on the dynamic trusted metric technology, the startup control strategy is designed, which ensures that the virtual machine can only be started when the metric is successful and the correct key is provided. This mechanism provides protection for the integrity of the initial state of the system and prevents SMM (System Management Mode) from bypassing attacks. 4, the fine-grained information flow access control mechanism is implemented. By modifying the Xen Hypervisor kernel and the Guest OS kernel, the control of the operation between and within the virtual machine can be realized, so as to ensure that the above operations can only be performed on the premise of satisfying the security policy of the virtual machine level and the principal resource level. This mechanism realizes the minimum privilege information flow control and the centralized and unified management of the security policy.
【學(xué)位授予單位】:解放軍信息工程大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2012
【分類號】:TP302

【參考文獻】

相關(guān)期刊論文 前2條

1 謝鈞;黃皓;;一個非確定系統(tǒng)的不干擾模型[J];軟件學(xué)報;2006年07期

2 劉威鵬;張興;;基于非傳遞無干擾理論的二元多級安全模型研究[J];通信學(xué)報;2009年02期



本文編號:2461409

資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/kejilunwen/jisuanjikexuelunwen/2461409.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶a6bdc***提供,本站僅收錄摘要或目錄,作者需要刪除請E-mail郵箱bigeng88@qq.com
欧美国产在线观看精品| 大香蕉久草网一区二区三区| 亚洲国产成人久久99精品 | 欧洲自拍偷拍一区二区| 国产一区二区精品高清免费| 亚洲午夜av一区二区| 亚洲熟妇av一区二区三区色堂| 久久老熟女一区二区三区福利 | 日韩国产亚洲一区二区三区| 草草视频精品在线观看| 在线观看那种视频你懂的| 色综合视频一区二区观看| 欧美欧美欧美欧美一区| 在线观看视频国产你懂的| 欧美一区二区日韩一区二区| 99久久国产精品免费| 少妇丰满a一区二区三区| 国产午夜精品久久福利| 国产精品伦一区二区三区四季| 久久精品国产在热亚洲| 熟女乱一区二区三区四区| 亚洲av在线视频一区| 色综合伊人天天综合网中文| 国产精品免费自拍视频| 欧美日韩免费观看视频| 国产精品一区二区日韩新区| 日韩在线一区中文字幕| 在线观看国产成人av天堂野外| 日韩欧美亚洲综合在线| 99久久精品一区二区国产| 一二区不卡不卡在线观看| 久久香蕉综合网精品视频| 偷自拍亚洲欧美一区二页| 大香蕉再在线大香蕉再在线| 激情三级在线观看视频| 日韩欧美一区二区黄色| 中国美女偷拍福利视频| 国产91色综合久久高清| 亚洲国产成人爱av在线播放下载| 久久精品中文扫妇内射| 91人人妻人人爽人人狠狠|