A Lightweight Security Isolation Approach for Virtual Machines Deployment

被引:4
|
作者
Liang, Hongliang [1 ]
Han, Changyao [1 ]
Zhang, Daijie [1 ]
Wu, Dongyang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing 100088, Peoples R China
关键词
Virtualization; Hypervisor; Isolation; Migration; Mandatory access control;
D O I
10.1007/978-3-319-16745-9_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has changed the way of IT services; virtualization technology is the foundation of it, which directly affects the security and reliability of the cloud computing platform. From the point of virtualization technology security, we study to integrate mandatory access control mechanism into virtual machines deployment to control resources available for virtual machines, design and implement a lightweight MAC-based strong isolation and migration approach between virtual machines. Experiments show that our method is effective in isolation and migration, and with less performance overload.
引用
收藏
页码:516 / 529
页数:14
相关论文
共 50 条
  • [1] DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines
    Ruan, Wenwen
    Wang, Wenhao
    Liu, Shuang
    Duan, Ran
    Yan, Shoumeng
    [J]. SCIENCE OF CYBER SECURITY, SCISEC 2023, 2023, 14299 : 23 - 41
  • [2] Virtual machines, virtual security?
    Bellovin, Steven M.
    [J]. COMMUNICATIONS OF THE ACM, 2006, 49 (10) : 104 - 104
  • [3] On the security vulnerabilities of the virtual force approach to mobile sensor deployment
    Bartolini, N.
    Bongiovanni, G.
    La Porta, T.
    Silvestri, S.
    [J]. 2013 PROCEEDINGS IEEE INFOCOM, 2013, : 2418 - 2426
  • [4] i2kit: A Deployment Tool with the Simplicity of Containers and the Security of Virtual Machines
    Chico de Guzman, Pablo
    Gorostiaga, Felipe
    Sanchez, Cesar
    [J]. WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT I, 2018, 11233 : 81 - 95
  • [5] Scaling the Deployment of Virtual Machines in UnaCloud
    Chavarriaga, Jaime
    Forero-Gonzalez, Cesar
    Padilla-Agudelo, Jesse
    Munoz, Andres
    Caliz-Ospino, Rodolfo
    Castro, Harold
    [J]. HIGH PERFORMANCE COMPUTING, 2018, 796 : 399 - 413
  • [6] Real security for virtual machines
    Mattsson, Ulf
    [J]. Network Security, 2009, 2009 (04) : 15 - 17
  • [7] Security Architecture for Virtual Machines
    Tupakula, Udaya
    Varadharajan, Vijay
    Bichhawat, Abhishek
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 218 - +
  • [8] Elastic Provisioning of Virtual Machines for Container Deployment
    Nardelli, Matteo
    Hochreiner, Christoph
    Schulte, Stefan
    [J]. ICPE'17: COMPANION OF THE 2017 ACM/SPEC INTERNATIONAL CONFERENCE ON PERFORMANCE ENGINEERING, 2017, : 5 - 10
  • [9] Deployment of virtual machines in Lock-Keeper
    Cheng, Feng
    Meinel, Christoph
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 147 - +
  • [10] Deployment of grid gateways using virtual machines
    Childs, S
    Coghlan, B
    O'Callaghan, D
    Quigley, G
    Walsh, J
    [J]. ADVANCES IN GRID COMPUTING - EGC 2005, 2005, 3470 : 761 - 770