计算机科学 ›› 2016, Vol. 43 ›› Issue (4): 118-121.doi: 10.11896/j.issn.1002-137X.2016.04.024

• 信息安全 • 上一篇    下一篇

一种基于虚拟隔离机制的云盘安全访问模型

陈锋,鲍爱华,张维明   

  1. 国防科技大学信息系统与管理学院 长沙410073,解放军理工大学指挥信息系统学院 南京210007,国防科技大学信息系统与管理学院 长沙410073
  • 出版日期:2018-12-01 发布日期:2018-12-01
  • 基金资助:
    本文受国家自然科学基金项目(912024006)资助

Security Access to Cloud Disk via Virtual Isolation Mechanism

CHEN Feng, BAO Ai-hua and ZHANG Wei-ming   

  • Online:2018-12-01 Published:2018-12-01

摘要: 云盘技术是云计算领域的重要研究方向,由于存在数据泄漏方面的安全隐患,目前在持有核心数据的组织(如创新型企业、军队)中往往难以得到广泛应用。提出一种基于虚拟隔离机制的云盘安全访问模型ACIM,理论分析表明该模型能够防止企业内云盘上的敏感文件数据泄露;同时,基于该模型实现了面向企业私有云存储的电子文档集中管控系统(CFS),测试并分析了终端主机上CFS系统对文件读写操作性能的影响。目前该系统已在多个重要用户单位得到成功应用,具有广阔的应用前景。

关键词: 云盘,虚拟隔离,数据安全

Abstract: The cloud storage technology is an important research area of cloud computing.Because of the hidden trouble about data leakage,cloud storage services are often difficult to be widely used in organizations with the core data,such as the innovative enterprises or the army.For this issue,a noval security access model for cloud disk was proposed via the virtual isolation mechanism.Theoretical analysis shows that the model has ability to prevent sensitive data leakage in cloud disk of the enterprise.Further,an enterprise private cloud storage-oriented electronic document centralized ma-nagement and control system CFS was presented to test read/write operations performance based on the model.Until now,the system has been successfully applied to a number of important user units,and has very good development prospects.

Key words: Cloud disk,Virtual isolation,Date security

[1] https://www.dropbox.com
[2] https://skydrive.live.com
[3] http://www.ksyun.com
[4] http://yunpan.360.cn
[5] Cao Xi,Xu Li,Chen Lan-xiang.Data integrity verification protocol in cloud storage system[J].Journal of Computer Applications,2012,32(1):8-12(in Chinese) 曹夕,许力,陈兰香.云存储系统中数据完整性验证协议[J].计算机应用,2012,32(1):8-12
[6] Yan Xiang-tao,Li Yi-fa.Integrity Checking Algorithm Based on Hash Tree for Cloud Storage[J].Computer Science,2012,39(12):94-97(in Chinese) 颜湘涛,李益发.基于哈希树的云存储完整性检测算法[J].计算机科学,2012,39(12):94-97
[7] Liu Fan,Yang Ming.Ciphertext policy attribute based on en-cryption scheme for cloud storage[J].Application Research of Computers,2012,29(4):1452-1456(in Chinese) 刘帆,杨明.一种用于云存储的密文策略属性基加密方案[J].计算机应用研究,2012,29(4):1452-1456
[8] Lim H,Kapoor V,Wighe C.Active disk file system:Adistribu-ted,scalable filesystem[C]∥Proceedings of the Eighteenth IEEE Symposium.Washington,DC:IEEE Computer Society,2001:101-114
[9] Swank J D,Goodson G R,Scheinholtz M L,et al.Self-securing storage:Protecting data incompromised systems[C]∥Proc of the 4th Symposium on Operating Systems Design and Implementation.Berkeley,CA:USENIX Association,2000:12-26
[10] Jin Chao,Zhen Wei-min,Zhang You-hui.Active Storage Architecture[J].Chinese Journal of Computers,2005,8(6):1013-1020(in Chinese) 靳超,郑纬民,张悠慧.主动存储系统结构[J].计算机学报,2005,8(6):1013-1020
[11] Zhao Yue-long,Jiang Qian.Research and Design of the Virtua-lization Storage Technology Based on Intelligent Network Disk[J].Journal of Computer Research and Development,2009,6(Supp1):44-49(in Chinese) 赵跃龙,蒋骞.基于智能网络磁盘的虚拟存储技术的研究与设计[J].计算机研究与发展,2009,6(Supp1):44-49
[12] Using virtual desktop to improve the ability of the management and control [EB/OL].[2010-3-15].http://www.vmware.com/cn/solutions/desktop
[13] King S T,Dunlap G W,Chen P M.Operaring System Support for Virtual Machines[C]∥Proc of the 2003 Annual USENIX Technical Conference.2003:6
[14] Griffin J L,Jaeger T,Perez R,et al.Trusted virtual domains:Toward secure distributed services[C]∥Proceedings of the 1st IEEE Workshop on Hot Topics in System Dependability.Los Alamitos:IEEE Computer Society.2005:274-281
[15] Gasmi Y,Sadeghi A-R,Stewin P,et al.Flexible and Secure Enterprise Rights Management Based on Trusted Virtual Domains[C]∥Proc of the 3rd ACM Workshop on Scalable Trusted Computing.2008:71-88
[16] Yang Yu.OS level virtualization and its applications[D].NewYork:Stony Brook University,2007
[17] http://dokan-dev.net/en
[18] Denning D E.A lattice model of secure information flow[J].Communications of the ACM,1976,9(5):236-243

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!