面向云計(jì)算的可信虛擬環(huán)境關(guān)鍵技術(shù)研究
[Abstract]:Cloud computing is an Internet-based computing model, which distributes computing tasks over a pool of resources made up of a large number of computers. Consumers can obtain computing power, storage space and various software services according to their needs, and pay for them according to their usage. Cloud computing has brought about another innovation in the computer field and many new security issues. Based on the characteristics of distributed computing and storage in cloud computing, cloud computing security can be summarized as virtualization security, application security and tenant security. Virtualization security includes two parts: the security of virtual machine monitor (VMM) and the security of virtual machine operating system. Application security includes application environment security and trusted application services. Household security mainly studies how to ensure the security and effectiveness of the tenant isolation mechanism and protect the privacy of the tenants on the basis of sharing computing and storage resources in cloud computing. The combination has become a research hotspot. Virtual technology greatly improves the security of the system because of its high separation of virtual machines and high controllability of resources. Trusted computing provides basic support for the establishment of secure application support platform in the aspects of trusted authentication, trusted measurement, trusted storage and so on, and solves the trustworthiness of the system fundamentally. Therefore, a trusted cloud computing environment based on Trusted Computing and virtual technology can fundamentally ensure the security of user data and applications in the cloud environment. Virtual computing resource trustworthiness, application environment trustworthiness and tenant isolation trustworthiness are studied. A cloud-oriented trustworthiness virtual environment is established, and the key technologies are studied. The following four results are obtained. (1) Combining trusted computing with virtualization technology, a security virtual machine integrity monitoring is proposed. The mechanism SVMIM (Security Virtual Machine Integrity Monitor) is used to construct a trusted virtual computing resource environment. SVMIM uses a hybrid security architecture to monitor and control the code loading process of the virtual machine operating system based on trusted computing technology, which effectively overcomes the "semantic differences" problem and ensures the trustworthiness of the security mechanism itself. SVMIM is based on virtual machine network boot mechanism and uses storage cloning technology in network storage to minimize the impact of security mechanism on system performance. (2) Establish a trusted application environment using trusted computing technology. In cloud computing platform, cloud applications include not only general executable programs, but also Java applications and Web services. Because of the platform independence of Java program, some traditional methods based on operating system layer to measure the trustworthiness of executable program are not suitable. In this paper, we first use SVMIM mechanism to establish a trusted executable program application environment, and through the trustworthiness transformation of JVM, establish a trusted Java Platform (TJP), and implement it. (3) Cloud Service Provider (CSP) must prove the validity of the tenant isolation mechanism in cloud computing and enhance tenants'confidence in cloud computing isolation mechanism in order to let tenants buy cloud computing services. It unilaterally satisfies the trusted requirements of CSP and pays attention to the measurement of some external attributes of cloud services. It can not satisfy the high security requirements of the cloud tenant isolation mechanism. This paper presents a trusted cloud tenant isolation mechanism for transparent and controllable requirements, and regards the transparent and controllable requirements as different security requirements in a cloud computing system. Information flow between domains, which transfers the internal policy and real-time running information of the cloud tenant isolation mechanism from the cloud management platform security domain to the tenant security domain, provides a method and means for tenants to measure and verify the cloud tenant isolation mechanism; at the same time, this paper also proves the security of the proposed mechanism through the theory of information flow non-interference. (4) Implementing cloud desktop system, a typical application in cloud computing, to verify and experiment the proposed method. Trusted cloud desktop system includes three aspects: establishing trusted virtual computing resource environment, trusted application environment and trusted tenant isolation environment. The detailed design ideas and implementation methods of each functional module are given. Finally, the prototype system is analyzed and tested to prove its practical usability.
【學(xué)位授予單位】:北京交通大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP3
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 沈昌祥;;創(chuàng)新和發(fā)展我國信息安全等級保護(hù)制度[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2016年04期
2 張玉清;王曉菲;劉雪峰;劉玲;;云計(jì)算環(huán)境安全綜述[J];軟件學(xué)報(bào);2016年06期
3 沈昌祥;公備;;基于國產(chǎn)密碼體系的可信計(jì)算體系框架[J];密碼學(xué)報(bào);2015年05期
4 沈昌祥;;關(guān)于我國構(gòu)建主動(dòng)防御技術(shù)保障體系的思考[J];中國金融電腦;2015年01期
5 王曉龍;丁麗萍;廖曉鋒;金波;林渝淇;王秀利;王永吉;;基于動(dòng)態(tài)信任根的虛擬機(jī)監(jiān)控器動(dòng)態(tài)完整性度量架構(gòu)[J];計(jì)算機(jī)應(yīng)用;2014年S2期
6 丁滟;王懷民;史佩昌;吳慶波;戴華東;富弘毅;;可信云服務(wù)[J];計(jì)算機(jī)學(xué)報(bào);2015年01期
7 閆鑫;王慶生;王生原;;分區(qū)操作系統(tǒng)內(nèi)核中隔離性質(zhì)的研究[J];太原理工大學(xué)學(xué)報(bào);2014年04期
8 劉川意;林杰;唐博;;面向云計(jì)算模式運(yùn)行環(huán)境可信性動(dòng)態(tài)驗(yàn)證機(jī)制[J];軟件學(xué)報(bào);2014年03期
9 趙波;向,
本文編號(hào):2191101
本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/2191101.html