Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A Security Virtualization Isolation Method Based on Mirror Intelligent Management

An intelligent management and virtualization technology, which is applied in the field of cloud computing virtualization security, can solve problems such as virtual machine suspension, virtualization system crashes, crashes, etc., and achieve operating system isolation, balanced security isolation, and improved intrusion tolerance Effect

Inactive Publication Date: 2017-05-17
CLOUD COMPUTING CENT CHINESE ACADEMY OF SCI +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The current virtualization isolation technology cannot allow each virtual machine to equally share the disk bandwidth and ensure the I / O performance isolation between virtual machines, which often results in conflicts between file system data and local disk data, and inconsistencies in key operating system files will lead to Virtualization system crashes
Due to the difference between the virtual machine and the host hardware environment, local services that depend on the hardware system are likely to cause the virtual machine to hang or even crash when it starts
In addition, the existing isolation program only performs virtual machine isolation operations, but lacks tracking of isolation execution effects, and cannot monitor data deletion and modification behaviors caused by external attacks in the operating environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Security Virtualization Isolation Method Based on Mirror Intelligent Management
  • A Security Virtualization Isolation Method Based on Mirror Intelligent Management
  • A Security Virtualization Isolation Method Based on Mirror Intelligent Management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Such as figure 1As shown, it is an architecture diagram of the security virtualization isolation system based on intelligent image management of the present invention. The Safe Virtualization Isolation System (SVIS) architecture consists of five core components: SVIS Virtual Machine Monitor (SVIS VMM for short), virtualization security isolation based on mirroring intelligent management, operating system Live Migration Manager, Change Tracking Manager, and Virtualization Layer System Information components. According to the isolation operation model, SVIS VMM needs to be implemented in the form of VMM, that is, it runs on the host operating system. SVISVMM is responsible for creating an isolated operating environment for untrusted software—SVIS Virtual Machine (SVIS Virtual Machine, SVISVM for short). With the help of virtualization security isolation and operating system dynamic migration manager based on image intelligent management, SVIS realizes the local virtuali...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud computing virtualization safety, in particular to a safety virtualization isolation method based on mirror image intelligent management. The method includes the following steps of dynamically distributing and adjusting virtual machine resources, dynamically moving an operating system, executing virtualization safety isolation based on mirror image intelligent management, starting virtual machines from a host machine, modifying and tracking the execution effect of isolation programs and operating programs on the virtual machines or the host machine. Through the safety virtualization isolation method, safety isolation, functional completeness, performance adaptability, behavior monitorability and the like of a virtual system can be balanced, and the safety virtualization isolation method can be used for cloud computing virtualization safety.

Description

technical field [0001] The invention relates to the technical field of cloud computing virtualization security, in particular to a security virtualization isolation method based on image intelligent management. Background technique [0002] Virtualization is a rapidly developing emerging industry in the current cloud computing technology, with broad development prospects and application fields; but at the same time, the security threats and challenges faced by virtualized users and virtualized platforms in the Internet environment are also unprecedented. In a typical cloud computing service platform, resources are provided to users in the mode of virtualization and on-demand leasing. Virtualization can reduce operating costs and allow users to quickly deploy resources on demand; however, this flexibility also makes virtual machines Security risks are rapidly expanding on cloud computing platforms. If there are security holes in the virtualization software in the cloud compu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/53
CPCG06F21/53
Inventor 王飞跃孔庆杰邹哲峰熊刚朱凤华
Owner CLOUD COMPUTING CENT CHINESE ACADEMY OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products