Covert communication method under cloud computing environment

A cloud computing environment, covert communication technology, applied in the field of information security, can solve problems such as difficult to detect covert communication methods

Inactive Publication Date: 2011-11-16
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF2 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to propose an imperceptible covert communication method for the existing cloud computing virtualization platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Covert communication method under cloud computing environment
  • Covert communication method under cloud computing environment
  • Covert communication method under cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Below in conjunction with accompanying drawing, the present invention will be further described through embodiment, but does not limit the scope of the present invention in any way.

[0070] The present invention is a covert communication method for cloud computing virtualization platform, the overall process is as follows figure 2 As shown, taking the attack on the Xen virtual machine as an example, it specifically includes:

[0071] 1) The sender P i and receiver P j Agree on the encoding mechanism and synchronization mechanism for the transmission of confidential information. Agreed information includes confidential information transmission start / stop identifier S start and S end , and the binary encoding method of confidential information, and use T0 and T 1 represent the binary symbols 0 and 1 respectively and T 0 1 ,like Figure 4 shown. In this example, S start and S end They are represented by '11110000' respectively, that is, when '11110000' appears ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a covert communication method under a cloud computing environment. The method comprises the following steps: 1) a sender and a receiver agree on a coding and decoding method of confidential information, wherein the coding and decoding method means that the confidential information is coded into interval time in a normal data transmission; 2) the sender establishes a annular shared memory data structure and sends an authorization reference to the receiver, and the sender and the receiver load an annular shared memory control driver as a form of a kernel module to a client virtual machine core; 3) the receiver maps the shared memory to memory address space of the sender; 4) the sender and the receiver write and read normal data containing the confidential information in and from the shared memory as a mode of a producer /a consumer; 5) the receiver acquires an interval time sequence which represents the confidential information, decodes the interval time sequence and turns the interval time sequence into the confidential information; 6) the receiver removes the shared memory mapping, and the receiver recovers the authorization reference. By using the method of the invention, current integrity and safety mechanism of the virtual machine system can be broken through and covert information transmissions between the virtual machines can be realized.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a covert communication method in a cloud computing environment, which realizes covert transmission of confidential information. Background technique [0002] Cloud computing is a brand-new Internet service model that provides cloud customers with safe, reliable, and dynamically adjustable computing resource services. A typical cloud architecture is divided into an infrastructure layer, a platform layer, and an application layer. Virtualization technology provides scalability, availability, and security based on data isolation guarantees for computing resources. Data protection is the number one security issue facing cloud computing. How to protect customer data from being leaked is the key to cloud computing and virtualization technology. The inherent isolation of virtualization technology provides a certain degree of protection for customer data; at th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 吴敬征王永吉丁丽萍
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products