Safety dynamic migration method of Xen virtual machine

A technology of dynamic migration and virtual machine, applied in the direction of public key for secure communication, encryption device with shift register/memory, user identity/authority verification, etc. Achieve the effect of preventing tampering and ensuring transmission security

Inactive Publication Date: 2011-03-09
BEIJING 21VIANET DATA CENT
View PDF3 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hackers can modify the transmitted data, insert bugs in the virtual machine, and then control the entire virtual machine. All data and behaviors of the virtual machine are completely exposed to the eyes of hackers. Hackers can collect security information or confidential information from the operating environment of the virtual machine. Release viruses, paralyze the virtual machine operating environment, and cause serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety dynamic migration method of Xen virtual machine
  • Safety dynamic migration method of Xen virtual machine
  • Safety dynamic migration method of Xen virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The SSL protocol (abbreviation of Secure Socket Layer, secure socket layer protocol) can provide a secret transmission mechanism on the Internet. The SSL protocol specifies a mechanism to provide data security layers between application protocols (such as HTTP, Telenet, NMTP, FTP, etc.) and TCP / IP protocols. It provides data encryption, server authentication, and server authentication for TCP / IP connections. Message integrity and optional client authentication. The safe and dynamic migration method of Xen virtual machine of the present invention establishes a secure communication mechanism between the source physical server and the target physical server based on the SSL protocol.

[0029] The safe and dynamic migration method of the Xen virtual machine of the present invention is executed in the Domain 0 virtual machine. The present invention will be described in detail below.

[0030] Such as figure 2 As shown, the method for secure and dynamic migration of Xen virtual ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety dynamic migration method of an Xen virtual machine, which comprises the following steps: generating a key on a source physical server based on an SSL protocol by a symmetric cryptographic algorithm; generating a public key and a private key on a target physical server based on an SSL protocol by an asymmetric cryptographic algorithm, and transmitting the public key to the source physical server; encrypting the key by the public key on the source physical server, and transmitting the encrypted key to the target physical server; decrypting the encrypted key by the private key on the target physical server to obtain the key; encrypting a transfer object by the key on the source physical server, and transmitting the encrypted transfer object to the target physical server; and after the target physical server receives the encrypted transfer object, decrypting the encrypted transfer object so as to complete migration of the transfer object from the source physical server to the target physical server. The safety dynamic migration method effectively prevents a listener from stealing the transmitted data so as to ensure transmission security of the migrated data.

Description

Technical field [0001] The invention relates to a data dynamic migration method, in particular to a Xen virtual machine safe dynamic migration method. Background technique [0002] In today's computer field, the application of virtualization technology has become more and more extensive. Virtualization means that computer components operate on a virtual basis instead of on a real basis. Virtualization technology can expand the capacity of hardware and simplify the process of software reconfiguration. Multiple operating systems can be run on one platform at the same time, and applications can run in independent spaces without affecting each other, so as to significantly improve computer performance. Work efficiency. [0003] Xen is an open source virtualization product. The Xen virtualization environment is composed of Xen Hypervisor, Domain U (also divided into para-virtualization and full virtualization), and Domain 0. Xen Hypervisor is the core and foundation of Xen. For virt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/32H04L9/30H04L9/06
Inventor 徐安宋卓胡中沈启龙王鹏任海宝牛立新
Owner BEIJING 21VIANET DATA CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products