Virtual machine load balancing security dispatching method in cloud environment

A scheduling method and load balancing technology, applied in software simulation/interpretation/simulation, multi-program device, program control design, etc., can solve problems such as failure to make, being attacked, and different levels of security threats

Active Publication Date: 2016-11-09
PEKING UNIV
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] 2) The hypervisor is actually not as safe as people expect. Malicious users may exert malicious influence on the host hypervisor through known means, and then when the virtual machine of the victim user is migrated to the host through load balancing, it will be attacked , so that malicious users can indirectly achieve the attack target
[0016] 3) Load balancing is not unique to the selection of the migrated virtual machine and the calculation result of the target host
For example, for the same instance, if two different hosts are selected for different placement, the load balancing effect is the same, but the security threat level is not the same, and the load balancer cannot perceive this, so it cannot make a more secure overall choose

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine load balancing security dispatching method in cloud environment
  • Virtual machine load balancing security dispatching method in cloud environment
  • Virtual machine load balancing security dispatching method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0060] Take the host overloading of OpenStack as an example, where OpenStack Neat is selected as the load balancer.

[0061] 1) Suppose there are 3 hosts in the cloud environment in the initial state, that is, H={h 1 、h 2 、h 3}, there are 3 users, namely C={c 1 ,c 2 ,c 3}, user c 1 Have a virtual machine VM 1,1 、VM 1,2 , user c 2 Have a virtual machine VM 2,1 、VM 2,2 , user c 3 Have a virtual machine VM 3,1 、VM 3,2 、VM 3,3 . In the initial state h 1 VM 1,1 、VM 2,1 、VM 3,2 , h 2 VM 1,2 、VM 2,2 , there is a virtual machine VM on h3 3,1 . VM 3,3 . The security component receives the creation and placement information of all the above hosts, users, and virtual machines. set another x 1 =x 2 = 1, the information leakage rate of the virtual machine to the friendly virtual machine is 0, and the information leakage rate of the virtual machine to the trusted host is 0. If the system detects the current time h 1 Overload, assuming that user c at this time ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtual machine load balancing security dispatching method in a cloud environment. The method includes the steps that 1, an ID list of virtual machines on an overload host in the cloud environment is sent to a security assembly through a load balancer; 2, the security assembly sequentially calculates the information leakage rate of a next period after each virtual machine in the list is deleted, and then the obtained information leakage rates are returned to the load balancer; 3, the load balancer determines the candidate virtual machines needing to be migrated in the list according to the information leakage list; 4, the load balancer sends each candidate virtual machine ID and virtual machine IDs on an underload host to the security assembly; 5, the security assembly calculates the information leakage rate of a next period after each virtual machine is migrated to different hosts according to the sent virtual machine IDs, and the information leakage rates are returned to the load balancer; 6, the load balancer makes a virtual machine placement decision according to the calculation result. The migration security of the virtual machines is enhanced.

Description

technical field [0001] The invention relates to the field of security at the IaaS level of a cloud environment, in particular to a virtual machine load balancing method based on dynamic migration in a cloud environment, and belongs to the technical field of virtual machines and network security. Background technique [0002] With the rapid development of cloud computing, the scale and energy consumption of cloud computing data centers continue to increase, and virtual machine load balancing for the purpose of improving physical resource utilization and reducing energy consumption has become a research hotspot in the field of cloud computing in recent years. However, the current research on virtual machine load balancing mainly focuses on how to maximize resource utilization and energy reduction, while the security issues in the context of load balancing are less studied. During the load balancing process, the user's virtual machine will be continuously relocated to a new hos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F9/48
CPCG06F9/45558G06F9/4856G06F2009/4557G06F2009/45587
Inventor 沈晴霓孙茜李聪吴中海
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products