Virtual machine deployment method oriented to side channel attack defense of cloud computation environment

A technology for side-channel attack and cloud computing environment, which is applied in the field of virtual machine deployment for side-channel attack defense in cloud computing environment, and can solve the problems of security and privacy concerns, hindering the popularization and promotion of cloud computing, and large computing load.

Active Publication Date: 2012-07-11
XI AN JIAOTONG UNIV
View PDF2 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the cloud computing services that have been implemented, security and privacy issues have always been a concern, and have become one of the main factors hindering the popularization and promotion of cloud computing.
However, the current research on side-channel attack defense technology is mainly oriented to the stand-alone environment, and mainly has the following two deficiencies: (1) The calculation load is too large and it is oriented to non-standardized hardware, which is not ideal in the actual environment; (2) ) The proposal of these methods is based on the ideal condition that all side channel attack modes have been mastered, and it is also infeasible in the real environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine deployment method oriented to side channel attack defense of cloud computation environment
  • Virtual machine deployment method oriented to side channel attack defense of cloud computation environment
  • Virtual machine deployment method oriented to side channel attack defense of cloud computation environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0052] see figure 1 As shown, a virtual machine deployment method (Side-channel-attacks Defense Aware Virtual Machine Placement Scheme, referred to as SDAVMPS) for side channel attack defense of the present invention comprises the following steps:

[0053] (1) User resource pool mapping based on the number of virtual machines;

[0054] (2) Calculation of user reputation;

[0055] (3) User resource pool mapping based on reputation;

[0056] (4) Deployment and migration of virtual machines.

[0057] The specific implementation steps of a virtual machine deployment method oriented to side-channel attack defense in the present invention are given below.

[0058] Step 1: User resource pool mapping based on the number of virtual machines

[0059] By implementing a side-channel attack based on CPUcache in the actual cloud computing system (Qingyun experimental ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a virtual machine deployment method oriented to side channel attack defense of a cloud computation environment. The virtual machine deployment method comprises the following steps of: (1) user resource pool mapping based on number of virtual machines; (2) computation of user credibility; (3) user resource pool mapping based on credibility; and (4) deployment of the virtual machines. Due to adoption of the virtual machine deployment disclosed by the invention, the co-residing rate of the virtual machines in a system can be reduced by about 30 percent, and the resource utilization rate is reduced by about 5 percent; the isolation strength of a user virtual machine executing environment is effectively enhanced by reducing the co-residing rate of the virtual machines; and the virtual machine deployment method disclosed by the invention has the capability of effectively improving the side channel attack defense power of a cloud computation system and does not excessively lose resource utilization rate.

Description

【Technical field】 [0001] The invention relates to the field of computer technology, in particular to a virtual machine deployment method for side channel attack defense in a cloud computing environment. 【Background technique】 [0002] Cloud computing migrates computing and data resources from user desktops or within the enterprise to the Web, and almost all IT resources can be provided as cloud services: applications, programming tools, computing power, storage capacity, even communication services and collaboration tools, etc. . In the cloud computing environment, users only need to use network terminals (such as mobile phones, PDAs, PCs, etc.) to use various software, storage, computing and other services provided by cloud computing. At the same time, as a new network computing model, cloud computing can not only reduce the cost of IT equipment for enterprises, but also save large-scale enterprise budgets and provide IT services in a more economical way than traditional I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F9/455
Inventor 桂小林余思黄汝维庄威
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products