Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 24-28.doi: 10.11896/j.issn.1002-137X.2017.6A.005

Previous Articles     Next Articles

Survey of Virtualization Access Control Research Based on Xen

KE Wen-jun, DONG Bi-dan and GAO Yang   

  • Online:2017-12-01 Published:2018-12-01

Abstract: Virtualization is the core technology of cloud computing,with its wide application and rapid development,the security threat has become increasingly prominent,seriously hindering the development of virtualization,which is an important issue to be resolved at the same time.Academic circles put forward various solutions,including access control technology,it’s viewed as an important barrier to virtualization security,attaining a wide range of attention and research.This paper started with a review of access control technology development and contrast,followed by analysis of the Xen virtualization environment security issues,as well as access to the control techniques.Finally,researches on the current domestic and foreign virtualization security access control were summarized.

Key words: Virtualization,Cloud computing,Virtualization security,Access control,Xen virtualization

[1] 李树波,罗林,杨艳.云计算与虚拟化技术研究[J].软件导刊,2013,12(1):141-143.
[2] 冯国登,张敏,张妍.云计算安全研究[J].软件学报,2011,22(1):22-28.
[3] 房晶,吴昊,白松林.云计算的虚拟化安全问题[J].电信科学,2012,12(4):135-140.
[4] 张兴杰,马文平.基于加密的访问控制在云计算中的应用研究[D].西安:西安电子科技大学,2014.
[5] 秦中元,沈日胜,张群芳,等.虚拟机系统安全综述[J].计算机应用研究,2012,29(5):1618-1623.
[6] 石磊,邹德清,金海.Xen虚拟化技术[M].武汉:华中科技大学出版社,2009.
[7] 丁滟,王怀民.可信云服务[J].计算机学报,2015,38(1):133-149.
[8] WU J Z,DING L P.Identification and evaluation of sharingmemory covert timing channel in Xen Virtual Machines[C]∥Washington DC:IEEE Computer Society.2011:283-291.
[9] 王永吉,吴敬征,曾海涛.隐蔽信道研究[J].软件学报,2010,21(9):2265-2283.
[10] DING B,HE Y,WU Y,et al.HyperVerify:a vm-assinted architecture for monitoring hypervisor non-control data[C]∥Proceeding for the IEEE 7th International Conference on software Security and Reliability Companion.Gaitheraburg,MD,USA,2013:26-34.
[11] 孟江涛,卢显良.Xen虚拟机研究[D].成都:电子科技大学,2003.
[12] RILE Y R,JIANG X,DONG Y.Guest-transparent prevention of kernel Rootkits with VMM-based memory shadwing[C]∥Proc of the 11th International Symposium on Recent Advances in Intrusion Detection.Berlin:Springer,2008:1-20.
[13] 石磊,邹德清,金海.Xen虚拟化技术[M].武汉:华中科技大学出版社,2009.
[14] 马喆,禹熹,袁傲,等.Xen安全机制探析[J].理论研究,2011,9(11):31-36.
[15] 刘谦,李明禄.面向云计算的虚拟机系统安全研究[D].上海:上海交通大学,2012.
[16] 李凤华,苏芒,史国振.访问控制模型研究进展及发张趋势[J].电子学报,2012,40(4):805-813.
[17] 刘苏娜,潘理.虚拟化平台下基于BLP的网络访问控制机制研究与实现[D].上海:上海交通大学,2011.
[18] 刘谦,李明禄.面向云计算的虚拟机系统安全研究[D].上海:上海交通大学,2012:1-122.
[19] WANG X W,ZHAO Y M.A task-role-based access controlmodel for cloud computing[J].Computer Engineering,2012,38(24):9-13.
[20] 赵明斌,姚志强.基于RBAC的云计算访问控制模型[J].计算机应用,2012,32(S2):267-270.
[21] 李春燕,张亚平.云计算环境下基于角色的访问控制模型研究[D].天津:天津大学,2012.
[22] 邹佳顺,张永胜.云环境下基于属性的访问控制模型及应用研究[D].济南:山东师范大学,2015.
[23] WANG X M,FU H,ZHANG L C.Research progress on attri-bute-based access control[J].Chinese Journal of Electronics,2010,38(7):1660-1667.
[24] VIPUL G,AMIT S,OMKANT P,et al.Attribute-Based en-cryption for fine-grained access control of encrypted data[J].Proc.of the ACM conf on Computer and Communications Security,2006,14(3):89-98.
[25] 刘斐,任兰芳,柏洪涛.客户虚拟机磁盘数据安全性的保护方法[J].计算机应用与软件,2015,32(2):71-76.
[26] 武越,刘向东.涉密环境桌面虚拟化多级安全系统设计与实现[J].计算机工程与设计,2014,9(1):101-104.
[27] 邹德清,杨凯,张晓旭.虚拟域内访问控制系统的保护机制研究[J].山东大学学报,2014,49(9):135-142.
[28] 王静,徐开勇.Xen无干扰安全策略模型及安全机制研究[D].郑州:解放军信息工程大学,2012.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!