XEN cloud platform virtual machine isolation method based on memory isolation

A memory isolation, cloud platform technology, applied in the field of information security, can solve the problems of inconvenience to join, stay in traditional security problems, and change the XEN environment, and achieve the effect of improving security.

Inactive Publication Date: 2013-11-27
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when this technology is actually deployed, the changes to the XEN environment are too large, and it is not convenient to add it to the actual XEN environment.
[0008] To sum up, there have been some studies on the security of virtual machine systems in cloud environments at home and abroad, most of which stay on the research of traditional security issues, some of which have not considered the facts and deployment issues, and have not combined XEN source code. , the analysis and research of the overall structure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • XEN cloud platform virtual machine isolation method based on memory isolation
  • XEN cloud platform virtual machine isolation method based on memory isolation
  • XEN cloud platform virtual machine isolation method based on memory isolation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and examples.

[0035] Explanation of the principle: A method for isolating virtual machines on the XEN cloud platform based on memory isolation proposed by the embodiment of the present invention analyzes the memory mapping relationship between virtual machines by intercepting the operation of the XEN memory authorization table, and then completes the authorization through the extended ACM. The validity of the operation is verified, and the operation is released only after the verification is passed. Finally, the security isolation of memory between virtual machines is completed through the control of the authorization table.

[0036] The present invention provides a method for isolating a virtual machine of a XEN cloud platform based on memory isolation, comprising th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an XEN cloud platform virtual machine isolation method based on memory isolation, and belongs to the field of information safety. The XEN cloud platform virtual machine isolation method based on memory isolation comprises the following steps of S1, carrying out interception on an authorization list operation, S2, extending the ACM mechanism, achieving validity verification of the authorization list operation, letting the authorization list operation pass when the validity verification of the authorization list operation gets through, and S3, carrying out control execution on the passed authorization list operation. The XEN cloud platform virtual machine isolation method based on memory isolation has the advantages that the authorization list operation of an XEN memory is intercepted to carry out analysis on the memory mapping relation between virtual machines, the validity verification of the authorization list operation is accomplished through an extended ACM, the authorization list operation is let pass after the validity verification of the authorization list operation gets through, memory safety isolation between the virtual machines is accomplished through control over an authorization list, and the XEN cloud platform virtual machine isolation method based on memory isolation belongs to the field of Hypervisor safety research, can achieve safe isolation of a memory resource, and improves safety of the XEN cloud environment.

Description

technical field [0001] The invention relates to a method for isolating a virtual machine of a XEN cloud platform based on memory isolation, and belongs to the field of information security. Background technique [0002] The concept of cloud was first proposed by American John McCarthy in the 1990s, when he pointed out that computer resources can be provided to the public as a service like water and electricity. In March 2006, Amazon launched the Elastic Computing Cloud (EC2) service, and then Google CEO Eric Schmidt first proposed the concept of "cloud computing" at the Search Engine Conference. Cloud computing is a model for the growth, usage and delivery of Internet-based related services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. [0003] The rapid development of cloud technology gradually affects people's lives. According to a report by market research company IHS iSuppli, the current total number of clou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
Inventor 王迪邵长庚刘丹
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products