期刊文献+

云计算环境下的内核虚拟机技术安全研究 被引量:4

Research on Security of Kernel-based Virtual Machine Virtualization Technology in Cloud Computing Environment
在线阅读 下载PDF
导出
摘要 对云计算环境下的基于内核的虚拟机技术(KVM)的虚拟化技术的安全性进行了分析和研究,KVM虚拟化技术从2007年加入Linux内核开始,迅速成长为开源虚拟化技术第一方案,并随着云计算技术的兴起,成为全球IT设施的基础架构之一。分析了KVM虚拟化技术的基本架构及其工作原理,从主机维度和虚拟机维度2个维度对KVM虚拟化技术在云计算环境下的安全性进行了分析和研究。 This paper studies and analyzes the security of Kernel-based Virtual Machine(KVM) virtualization technology in cloud computing environment. Since the KVM virtualization technology has been added in the Linux kernel in 2007,it becomes the most popular open source virtualization technology. With the rising of cloud computing technology,KVM becomes one of the basic architecture of global IT infrastructure. This paper analyzes the basic architecture and the principle of the KVM virtualization technology,and proposes how to enhance the security of KVM virtualization technology in such two dimension as the host and the virtual machine.
作者 张江 贾玉洁 张晓宇 ZHANG Jiang JIA Yu-jie ZHANG Xiao-yu(Hebei Far-east Communication System Engineering Co, Ltd., Shijiazhuang Hebei 050081, China)
出处 《计算机与网络》 2017年第4期72-75,共4页 Computer & Network
关键词 云计算 KVM 虚拟化 安全 Coud KVM virtualization security
  • 相关文献

参考文献9

二级参考文献168

  • 1王建军.VMWare虚拟机技术在计算机机房管理中的应用[J].科技信息,2009(1). 被引量:21
  • 2董耀祖,周正伟.基于X86架构的系统虚拟机技术与应用[J].计算机工程,2006,32(13):71-73. 被引量:63
  • 3刘荣发.服务器虚拟化技术在图书馆数字化服务中的应用[J].现代图书情报技术,2007(4):79-82. 被引量:65
  • 4Sims K. IBM introduces ready-to-use cloud computing collaboration services get clients started with cloud computing. 2007. http://www-03.ibm.com/press/us/en/pressrelease/22613.wss
  • 5Boss G, Malladi P, Quan D, Legregni L, Hall H. Cloud computing. IBM White Paper, 2007. http://download.boulder.ibm.com/ ibmdl/pub/software/dw/wes/hipods/Cloud_computing_wp_final_8Oct.pdf
  • 6Zhang YX, Zhou YZ. 4VP+: A novel meta OS approach for streaming programs in ubiquitous computing. In: Proc. of IEEE the 21st Int'l Conf. on Advanced Information Networking and Applications (AINA 2007). Los Alamitos: IEEE Computer Society, 2007. 394-403.
  • 7Zhang YX, Zhou YZ. Transparent Computing: A new paradigm for pervasive computing. In: Ma JH, Jin H, Yang LT, Tsai JJP, eds. Proc. of the 3rd Int'l Conf. on Ubiquitous Intelligence and Computing (UIC 2006). Berlin, Heidelberg: Springer-Verlag, 2006. 1-11.
  • 8Barroso LA, Dean J, Holzle U. Web search for a planet: The Google cluster architecture. IEEE Micro, 2003,23(2):22-28.
  • 9Brin S, Page L. The anatomy of a large-scale hypertextual Web search engine. Computer Networks, 1998,30(1-7): 107-117.
  • 10Ghemawat S, Gobioff H, Leung ST. The Google file system. In: Proc. of the 19th ACM Symp. on Operating Systems Principles. New York: ACM Press, 2003.29-43.

共引文献2602

同被引文献31

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部