天堂国产午夜亚洲专区-少妇人妻综合久久蜜臀-国产成人户外露出视频在线-国产91传媒一区二区三区

當(dāng)前位置:主頁 > 碩博論文 > 信息類博士論文 >

面向云計(jì)算的可信虛擬環(huán)境關(guān)鍵技術(shù)研究

發(fā)布時(shí)間:2018-08-19 07:41
【摘要】:云計(jì)算是一種基于互聯(lián)網(wǎng)的計(jì)算模式,它將計(jì)算任務(wù)分布在大量計(jì)算機(jī)構(gòu)成的資源池上,消費(fèi)者能夠根據(jù)需要獲取計(jì)算力、存儲(chǔ)空間和各種軟件服務(wù),并按使用量付費(fèi)。云計(jì)算引起了計(jì)算機(jī)領(lǐng)域的又一場革新,也帶來了許多新的安全問題。基于云計(jì)算分布式計(jì)算和存儲(chǔ)的特點(diǎn),云計(jì)算安全問題可總結(jié)為虛擬化安全、應(yīng)用安全和租戶安全三個(gè)方面。虛擬化安全包括虛擬機(jī)監(jiān)視器(VMM)的安全和虛擬機(jī)操作系統(tǒng)安全兩個(gè)部分。應(yīng)用安全包括應(yīng)用環(huán)境安全和可信應(yīng)用服務(wù)。租戶安全主要研究在云計(jì)算共享計(jì)算資源和存儲(chǔ)資源的基礎(chǔ)上,如何保證租戶隔離機(jī)制的安全有效,保護(hù)租戶隱私。從研究現(xiàn)狀來看,三方面的研究能在一定程度上解決云計(jì)算中的安全問題,但也都存在局限性。當(dāng)前,可信計(jì)算與云計(jì)算的結(jié)合已經(jīng)成為研究熱點(diǎn)。虛擬技術(shù)由于其對虛擬機(jī)的高分離性和對資源的高可控性,大大提高了系統(tǒng)的安全性,可信計(jì)算在可信認(rèn)證、可信度量、可信存儲(chǔ)等方面為安全應(yīng)用支撐平臺(tái)的建立提供了基礎(chǔ)支持,從根本上來解決系統(tǒng)的可信性和安全性問題,因此緊密結(jié)合可信計(jì)算和虛擬技術(shù)建立"可信云計(jì)算環(huán)境",可從根本上確保云環(huán)境中用戶數(shù)據(jù)和應(yīng)用的安全。在沈昌祥院士提出的云計(jì)算安全可信架構(gòu)下,本文把租戶隔離機(jī)制的可信要求加入到可信云計(jì)算環(huán)境中,從虛擬計(jì)算資源可信、應(yīng)用環(huán)境可信和租戶隔離可信三個(gè)方面展開研究,建立面向云計(jì)算的可信虛擬環(huán)境,并對其中的關(guān)鍵技術(shù)進(jìn)行研究,取得下面四個(gè)方面的成果。(1)把可信計(jì)算與虛擬化技術(shù)相結(jié)合,提出了一種安全虛擬機(jī)完整性監(jiān)控機(jī)制SVMIM(Security Virtual Machine Integrity Monitor),構(gòu)建可信虛擬計(jì)算資源環(huán)境。SVMIM采用混雜模式的安全結(jié)構(gòu),基于可信計(jì)算技術(shù)對虛擬機(jī)操作系統(tǒng)的代碼加載過程進(jìn)行監(jiān)視和控制,有效克服"語義差別"問題,并保證安全機(jī)制自身的可信;同時(shí),SVMIM基于虛擬機(jī)網(wǎng)絡(luò)引導(dǎo)機(jī)制,在網(wǎng)絡(luò)存儲(chǔ)端使用存儲(chǔ)克隆技術(shù),最大程度地降低安全機(jī)制對系統(tǒng)性能的影響。(2)利用可信計(jì)算技術(shù),建立可信的應(yīng)用環(huán)境。在云計(jì)算平臺(tái)中,云應(yīng)用不僅包括一般的可執(zhí)行程序,也包括Java應(yīng)用和Web服務(wù)。由于Java程序的平臺(tái)無關(guān)性,一些傳統(tǒng)的基于操作系統(tǒng)層對可執(zhí)行程序進(jìn)行可信度量的方法并不適應(yīng)。本文先利用SVMIM機(jī)制,建立可信的可執(zhí)行程序應(yīng)用環(huán)境,并且通過對JVM的可信改造,建立起一個(gè)可信Java平臺(tái)(Trusted Java Platform,TJP),實(shí)現(xiàn)信任鏈在JVM中的傳遞,確保云計(jì)算應(yīng)用環(huán)境的可信。(3)為了讓租戶購買云計(jì)算服務(wù),云計(jì)算服務(wù)提供商(Cloud Service Provider,CSP)必須證明云計(jì)算中的租戶隔離機(jī)制的有效性,提高租戶對云計(jì)算隔離機(jī)制的信心。而現(xiàn)有的云租戶隔離機(jī)制只是單方面滿足CSP的可信要求,注重對云服務(wù)的某些外部屬性進(jìn)行測量,不能滿足租戶對云租戶隔離機(jī)制的高安全性要求。本文給出了一種面向透明可控要求的可信云租戶隔離機(jī)制,把透明可控性要求看作是一種云計(jì)算系統(tǒng)中不同安全域之間的信息流,它將云租戶隔離機(jī)制的內(nèi)部策略和實(shí)時(shí)運(yùn)行信息從云管理平臺(tái)安全域傳送到租戶安全域,從而為租戶測量和驗(yàn)證云租戶隔離機(jī)制提供了一種方法和手段;同時(shí),本文還通過信息流無干擾理論證明了所提出機(jī)制的安全有效性,進(jìn)一步提高了租戶對云租戶隔離機(jī)制的信心水平。(4)實(shí)現(xiàn)云桌面系統(tǒng)這一云計(jì)算中的典型應(yīng)用來對本文提出的方法進(jìn)行驗(yàn)證和實(shí)驗(yàn)?尚旁谱烂嫦到y(tǒng)從建立可信虛擬計(jì)算資源環(huán)境、可信應(yīng)用環(huán)境和可信租戶隔離環(huán)境三個(gè)方面來進(jìn)行設(shè)計(jì),并給出了每個(gè)功能模塊詳細(xì)的設(shè)計(jì)思路和實(shí)現(xiàn)方法,最后對原型系統(tǒng)進(jìn)行安全性分析和性能測試,證明了其實(shí)際可用性。
[Abstract]:Cloud computing is an Internet-based computing model, which distributes computing tasks over a pool of resources made up of a large number of computers. Consumers can obtain computing power, storage space and various software services according to their needs, and pay for them according to their usage. Cloud computing has brought about another innovation in the computer field and many new security issues. Based on the characteristics of distributed computing and storage in cloud computing, cloud computing security can be summarized as virtualization security, application security and tenant security. Virtualization security includes two parts: the security of virtual machine monitor (VMM) and the security of virtual machine operating system. Application security includes application environment security and trusted application services. Household security mainly studies how to ensure the security and effectiveness of the tenant isolation mechanism and protect the privacy of the tenants on the basis of sharing computing and storage resources in cloud computing. The combination has become a research hotspot. Virtual technology greatly improves the security of the system because of its high separation of virtual machines and high controllability of resources. Trusted computing provides basic support for the establishment of secure application support platform in the aspects of trusted authentication, trusted measurement, trusted storage and so on, and solves the trustworthiness of the system fundamentally. Therefore, a trusted cloud computing environment based on Trusted Computing and virtual technology can fundamentally ensure the security of user data and applications in the cloud environment. Virtual computing resource trustworthiness, application environment trustworthiness and tenant isolation trustworthiness are studied. A cloud-oriented trustworthiness virtual environment is established, and the key technologies are studied. The following four results are obtained. (1) Combining trusted computing with virtualization technology, a security virtual machine integrity monitoring is proposed. The mechanism SVMIM (Security Virtual Machine Integrity Monitor) is used to construct a trusted virtual computing resource environment. SVMIM uses a hybrid security architecture to monitor and control the code loading process of the virtual machine operating system based on trusted computing technology, which effectively overcomes the "semantic differences" problem and ensures the trustworthiness of the security mechanism itself. SVMIM is based on virtual machine network boot mechanism and uses storage cloning technology in network storage to minimize the impact of security mechanism on system performance. (2) Establish a trusted application environment using trusted computing technology. In cloud computing platform, cloud applications include not only general executable programs, but also Java applications and Web services. Because of the platform independence of Java program, some traditional methods based on operating system layer to measure the trustworthiness of executable program are not suitable. In this paper, we first use SVMIM mechanism to establish a trusted executable program application environment, and through the trustworthiness transformation of JVM, establish a trusted Java Platform (TJP), and implement it. (3) Cloud Service Provider (CSP) must prove the validity of the tenant isolation mechanism in cloud computing and enhance tenants'confidence in cloud computing isolation mechanism in order to let tenants buy cloud computing services. It unilaterally satisfies the trusted requirements of CSP and pays attention to the measurement of some external attributes of cloud services. It can not satisfy the high security requirements of the cloud tenant isolation mechanism. This paper presents a trusted cloud tenant isolation mechanism for transparent and controllable requirements, and regards the transparent and controllable requirements as different security requirements in a cloud computing system. Information flow between domains, which transfers the internal policy and real-time running information of the cloud tenant isolation mechanism from the cloud management platform security domain to the tenant security domain, provides a method and means for tenants to measure and verify the cloud tenant isolation mechanism; at the same time, this paper also proves the security of the proposed mechanism through the theory of information flow non-interference. (4) Implementing cloud desktop system, a typical application in cloud computing, to verify and experiment the proposed method. Trusted cloud desktop system includes three aspects: establishing trusted virtual computing resource environment, trusted application environment and trusted tenant isolation environment. The detailed design ideas and implementation methods of each functional module are given. Finally, the prototype system is analyzed and tested to prove its practical usability.
【學(xué)位授予單位】:北京交通大學(xué)
【學(xué)位級別】:博士
【學(xué)位授予年份】:2017
【分類號(hào)】:TP3

【參考文獻(xiàn)】

相關(guān)期刊論文 前10條

1 沈昌祥;;創(chuàng)新和發(fā)展我國信息安全等級保護(hù)制度[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2016年04期

2 張玉清;王曉菲;劉雪峰;劉玲;;云計(jì)算環(huán)境安全綜述[J];軟件學(xué)報(bào);2016年06期

3 沈昌祥;公備;;基于國產(chǎn)密碼體系的可信計(jì)算體系框架[J];密碼學(xué)報(bào);2015年05期

4 沈昌祥;;關(guān)于我國構(gòu)建主動(dòng)防御技術(shù)保障體系的思考[J];中國金融電腦;2015年01期

5 王曉龍;丁麗萍;廖曉鋒;金波;林渝淇;王秀利;王永吉;;基于動(dòng)態(tài)信任根的虛擬機(jī)監(jiān)控器動(dòng)態(tài)完整性度量架構(gòu)[J];計(jì)算機(jī)應(yīng)用;2014年S2期

6 丁滟;王懷民;史佩昌;吳慶波;戴華東;富弘毅;;可信云服務(wù)[J];計(jì)算機(jī)學(xué)報(bào);2015年01期

7 閆鑫;王慶生;王生原;;分區(qū)操作系統(tǒng)內(nèi)核中隔離性質(zhì)的研究[J];太原理工大學(xué)學(xué)報(bào);2014年04期

8 劉川意;林杰;唐博;;面向云計(jì)算模式運(yùn)行環(huán)境可信性動(dòng)態(tài)驗(yàn)證機(jī)制[J];軟件學(xué)報(bào);2014年03期

9 趙波;向,

本文編號(hào):2191101


資料下載
論文發(fā)表

本文鏈接:http://sikaile.net/shoufeilunwen/xxkjbs/2191101.html


Copyright(c)文論論文網(wǎng)All Rights Reserved | 網(wǎng)站地圖 |

版權(quán)申明:資料由用戶cedf3***提供,本站僅收錄摘要或目錄,作者需要?jiǎng)h除請E-mail郵箱bigeng88@qq.com
欧美多人疯狂性战派对| 少妇人妻一级片一区二区三区| 不卡视频在线一区二区三区| 日韩精品综合福利在线观看| 久久三级国外久久久三级| 精品伊人久久大香线蕉综合| 亚洲香艳网久久五月婷婷| 日本高清加勒比免费在线| 91欧美日韩精品在线| 一区二区三区国产日韩| 东京不热免费观看日本| 亚洲男人的天堂就去爱| 欧美日韩中黄片免费看| 97人妻精品一区二区三区男同| 久久中文字幕中文字幕中文| 亚洲欧美日韩国产成人| 精品高清美女精品国产区| 黄色美女日本的美女日人| 亚洲伦理中文字幕在线观看| 熟女少妇久久一区二区三区| 亚洲一区二区三区熟女少妇| 国产一区二区三区av在线| 亚洲欧洲精品一区二区三区| 粉嫩内射av一区二区| 日本一品道在线免费观看| 国产精品欧美一级免费| 欧美黑人在线一区二区| 日韩精品中文字幕在线视频| 欧美日韩国产欧美日韩| 99久久精品一区二区国产| 国产精品成人又粗又长又爽| 国内精品一区二区欧美| 中文字幕人妻日本一区二区| 亚洲国产成人av毛片国产| 精品推荐国产麻豆剧传媒| 一区二区日本一区二区欧美| 日本少妇aa特黄大片| 久久精品中文扫妇内射| 黄色污污在线免费观看| 91偷拍与自偷拍精品| 欧洲一级片一区二区三区|