期刊文献+

云计算虚拟环境的形式化安全验证 被引量:8

Formal Security Verification of Virtual Environment in Cloud Computing
原文传递
导出
摘要 云计算是一种新兴的计算、存储资源使用模式,由于具备低成本、高效率等优点,得到了业界的广泛应用,但安全性仍然是云计算推广最大的障碍之一。虚拟化作为云计算的关键技术,其安全水平直接影响云环境的安全性,目前对云计算虚拟环境多采用传统的覆盖式验证方法,无法彻底解决正确性问题。文中通过结合形式化方法中的模型检测技术,经过配置采集、需求分析和性质检测3个阶段对虚拟化安全性质进行高覆盖率验证,提供了一种对云计算环境进行安全评估的可行思路。 Cloud computing is an emerging utilization mode for computation and storage resources, and receives wide application in IT fields for its low cost and high efficiency. However, as a key component of cloud computing, the security of virtualization directly affects the security performance of cloud computing. Currently the most frequently-used method for verification of cloud virtual environment is traditionally coverage-based and could not ensure the correctness in theory. By combining model checking technique in formal methods with cloud computing, three steps of configuration gathering, requirement analysis and property verification are performed, thus to complete the highly-covered verification of the virtualization security. Simulation on the virtual environment indicates that this method is feasible and applicable.
出处 《信息安全与通信保密》 2012年第4期64-66,共3页 Information Security and Communications Privacy
基金 保密通信重点实验室基金资助项目(编号:9140C1104011003)
关键词 云计算 虚拟化 形式化方法 模型检测 安全验证技术 cloud computing virtualization formal methods model checking security verification
  • 相关文献

参考文献4

二级参考文献8

共引文献67

同被引文献55

  • 1宋蕾,李俊莉.云计算环境下的计算机取证[J].河南科技,2011,30(1):56-57. 被引量:6
  • 2裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. 被引量:97
  • 3IBM. IBM Blue Cloud Solution[EB/OL]. (2009- 9-10) [2011-12-6]. http: //www-900.ibm.eom/ibm/ ideasfromibm/cn/cloud/solutions/index.shtml.
  • 4Sun. Sun Cloud Architecture Introduction White Paper(in Chinese)[ES/OL]. (2009-12-10)[2011-12-14]. http: //developers.sun.com.cn/blog/functionalca/resource/ sun_353cloudcomputing_chinese.pdf.
  • 5BARROSO L A, DEAN J, HOLZLE U. Web search for a planet: The Google cluster architecture[J]. IEEE Micro, 2003, 23(2): 22-28.
  • 6夏荣.云计算技术在电子数据取证领域的应用研究[J].唐息网络安全,2011(8):51-53.
  • 7PERRIG A, SZEWCZYK R, TYGAR J D, et al. SPINS: Security Protocols for Sensor Networks[J]. Wireless Networks Journal, 2002, 8(5): 521-534.
  • 8ARMANDO A, BASIN D, BOICHUT Y, et al. The AVISPA rool for the Automated Validation of Internet Security Protocols and Applications[J]. Computer Science, 2005, 3576: 135-165.
  • 9SMITH G. The Object-Z Specification Language[M]. Netherland : Kluwer Academic Publishers, 2000.
  • 10AlKuwaiti M, Kyriakopoulos N, Hussein S. A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability [J]. IEEE Communications Surveys & Tutorials, 2009, 11 (2) : 106-124.

引证文献8

二级引证文献31

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部