期刊文献+

云计算的虚拟化安全问题 被引量:45

Virtualization Security Issues in Cloud Computing
在线阅读 下载PDF
导出
摘要 随着云计算的发展,云计算的安全问题越来越受到关注。本文全面分析了云计算中与虚拟化安全有关的各类问题,阐述了虚拟化安全的研究现状并提出了未来发展方向。文中先介绍了虚拟化角度下的云计算架构,然后介绍了虚拟化技术,重点介绍了虚拟化安全问题和研究现状,接着以Xen平台为例,介绍了Xen的虚拟化安全问题,最后对未来的发展进行了展望。 With the development of cloud computing, the security issues of cloud computing are being more and more focused. Some types of virtualization security-related problems and current researches are being comprehensively analyzed in cloud computing. The future directions are also being proposed. Firstly, this paper describes the architecture of cloud computing in virtualization angle and then introduces the virtualization, focusing on virtualization security issues and the current researches, and then, Xen platform is an example. The Xen virtualization security issues are introduced. Finally the future development is prospected.
出处 《电信科学》 北大核心 2012年第4期135-140,共6页 Telecommunications Science
基金 国家自然科学基金资助项目(No.60830001) 轨道交通控制与安全国家重点实验室重点基金资助项目(No.RCS2010ZZ004)
关键词 云计算 虚拟化技术 虚拟化安全 XEN cloud computing, virtualization technology, virtualization security, Xen
  • 相关文献

参考文献18

  • 1王鹏,黄华峰,曹珂.云计算:中国未来的IT战略.北京:人民邮电出版社,2010.
  • 2王昊鹏,刘旺盛.虚拟化技术在云计算中的应用初探[J].电脑知识与技术,2008,3(9):1554-1554. 被引量:37
  • 3Jasti A,Shah P,Nagaraj R,et al.Security in multi-tenancycloud.Proceedings of 2010 IEEE International CarnahanConference on Security Technology(ICCST),San Jose,CA,2010:35~41.
  • 4Hanqian Wu,Yi Ding,Winer Chuck,et al.Network securityfor virtual machine in cloud computing.Proceedings of 5thInternational Conference on Computer,Sciences andConvergence Information Technology(ICCIT),Seoul,Korea,2010:18~21.
  • 5Tim Mather,Subra Kumaraswamy,Shahed Latif.Cloud Securityand Privacy.O'Reilly Media,2009.
  • 6Yanfeng Zhang,Cuirong Wang,Yuan Gao.A QoS-oriented network architecture based on virtualization.Proceedings of First International Workshop on Education Technology and Computer Science,Wuhan,China,2009:959~963.
  • 7Sehgal N K,Ganguli M.Applications of virtualization for server management and security.Proceedings of IEEE International Conference on Industrial Technology(ICIT),Mumbai,India,2006:2 752~2 755.
  • 8Xiaorui Wang,Yefu Wang.Coordinating power control and performance management for virtualized server clusters.IEEE Transactions on Parallel and Distributed Systems,2011,22(2):245~259.
  • 9闻剑峰,龚德志.虚拟化技术在电信灾难恢复计划中的应用研究[J].电信科学,2009,25(9):16-20. 被引量:13
  • 10Xen Introduction.http://xen.xensource.com/media/xen/player.html.

二级参考文献27

  • 1马洪朋,李星,倪庆剑,邢汉承.一种网络虚拟化存储系统的设计与实现[J].计算机工程与科学,2006,28(10):25-28. 被引量:12
  • 2张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:119
  • 3黄亮,冯登国,张敏.一个基于安全模型的测试用例生成工具[J].中国科学院研究生院学报,2007,24(3):300-306. 被引量:2
  • 4Matthew Barrett. Towards an open trusted computing framework [M. S. dissertation]. University of Auckland, Auckland, 2005
  • 5Bruschi Danilo, Cavallaro Lorenzo, Lanzi Andrea, Monga Mattia. Replay attack in TCG specification and solution// Proceedings of the 21th Annual Computer Security Application Conference (ACSAC). Tucson, AZ, USA, 2005: 127- 137
  • 6Sadeghi Ahmad Reza, Selhorst Marcel, Stuble Christian,Wachsmann Christian, Winandy Marcel. TCG Inside?-A note on TPM specification compliance//Proceedings of the 1st ACM Workshop on Scalable Trusted Computing (STC' 06). Virginia, USA, 2006:1-10
  • 7Fujiwara S, Bochmann G V, Khendek F, Amalou M, Ghedamsi A. Test selection based on finite state models. IEEE Transactions on Software Engineering, 1991, 17(6): 591- 603
  • 8Guerrouat Abdelaziz, Richter Harald. Reuse of test generation methods for embedded systems. Clausthal University of Technology, 2005
  • 9Bourhfir C, Dssouli R, Aboulhamid E M. Automatic test generation for EFSM-based systems. The Journal of Real- Time Systems, 1989, 1(1): 27- 60
  • 10Petrenko A, Boroday S, Groz R. Confirming configurations in EFSM testing. IEEE Transactions on Software Engineering, 2004, 30(1): 29-42

共引文献100

同被引文献204

引证文献45

二级引证文献159

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部