A virtual machine isolation method for xen cloud platform based on memory isolation

A memory isolation and cloud platform technology, applied in the field of information security, can solve problems such as inconvenient access, large changes in the XEN environment, and traditional security issues, and achieve the effect of improving security

Inactive Publication Date: 2016-04-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when this technology is actually deployed, the changes to the XEN environment are too large, and it is not convenient to add it to the actual XEN environment.
[0008] To sum up, there have been some studies on the security of virtual machine systems in cloud environments at home and abroad, most of which stay on the research of traditional security issues, some of which have not considered the facts and deployment issues, and have not combined XEN source code. , the analysis and research of the overall structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A virtual machine isolation method for xen cloud platform based on memory isolation
  • A virtual machine isolation method for xen cloud platform based on memory isolation
  • A virtual machine isolation method for xen cloud platform based on memory isolation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and examples.

[0035] Explanation of principle: A memory isolation-based virtual machine isolation method for the XEN cloud platform proposed by the embodiment of the present invention analyzes the memory mapping relationship between virtual machines by intercepting the operation of the XEN memory authorization table, and then completes the authorization through the extended ACM. The validity of the operation is verified, and the operation is released only after the verification is passed. Finally, the security isolation of memory between virtual machines is completed through the control of the authorization table.

[0036] The present invention provides a method for isolating a virtual machine of a XEN cloud platform based on memory isolation, comprising the following...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for isolating a virtual machine of a XEN cloud platform based on memory isolation, which belongs to the field of information security and includes the following steps: S1: intercepting the operation of the authorization table; S2: expanding the ACM mechanism to realize the effectiveness of the operation of the authorization table Verification, release if passed; S3: Control and execute the operation of the authorization table for release. The beneficial effects of the present invention are as follows: by intercepting the operation of the XEN memory authorization table, the memory mapping relationship between the virtual machines is analyzed, and then the validity verification of the authorization operation is completed through the extended ACM, and the operation is released only after the verification is passed. Finally, the security isolation of memory between virtual machines is completed through the control of the authorization table, which belongs to the field of hypervisor security research, which can achieve security isolation of memory resources and improve the security of the XEN cloud environment.

Description

technical field [0001] The invention relates to a method for isolating a virtual machine of a XEN cloud platform based on memory isolation, and belongs to the field of information security. Background technique [0002] The concept of cloud was first proposed by American John McCarthy in the 1990s, when he pointed out that computer resources can be provided to the public as a service like water and electricity. In March 2006, Amazon launched the Elastic Computing Cloud (EC2) service, and then Google CEO Eric Schmidt first proposed the concept of "cloud computing" at the Search Engine Conference. Cloud computing is a model for the growth, usage and delivery of Internet-based related services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. [0003] The rapid development of cloud technology gradually affects people's lives. According to a report by market research company IHSiSuppli, the current total number of cloud...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57
Inventor 王迪邵长庚刘丹
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products