A Lightweight Security Isolation Approach for Virtual Machines Deployment

被引:4
|
作者
Liang, Hongliang [1 ]
Han, Changyao [1 ]
Zhang, Daijie [1 ]
Wu, Dongyang [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing 100088, Peoples R China
关键词
Virtualization; Hypervisor; Isolation; Migration; Mandatory access control;
D O I
10.1007/978-3-319-16745-9_28
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has changed the way of IT services; virtualization technology is the foundation of it, which directly affects the security and reliability of the cloud computing platform. From the point of virtualization technology security, we study to integrate mandatory access control mechanism into virtual machines deployment to control resources available for virtual machines, design and implement a lightweight MAC-based strong isolation and migration approach between virtual machines. Experiments show that our method is effective in isolation and migration, and with less performance overload.
引用
收藏
页码:516 / 529
页数:14
相关论文
共 50 条
  • [21] Simplified Deployment of Virtual Machines Using an Intelligent Design Engine
    Oakes, James
    Johnson, Mark
    Xue, James
    Turner, Scott
    [J]. PROCEEDINGS OF THE 2016 SAI COMPUTING CONFERENCE (SAI), 2016, : 566 - 572
  • [22] TSAC: Enforcing Isolation of Virtual Machines in Clouds
    Weng, Chuliang
    Zhan, Jianfeng
    Luo, Yuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (05) : 1470 - 1482
  • [23] Using lightweight virtual machines to achieve resource adaptation in middleware
    Duran-Limon, H. A.
    Siller, M.
    Blair, G. S.
    Lopez, A.
    Lombera-Landa, J. F.
    [J]. IET SOFTWARE, 2011, 5 (02) : 229 - 237
  • [24] Security Isolation Strategy Mechanism for Lightweight Virtualization Environment
    Liu, Qian
    Li, Xiao-Yong
    Du, Jian
    Liu, Gang
    [J]. 2017 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (IST 2017), 2017, 11
  • [25] A Lightweight Approach for Deployment of Scientific Workflows in Cloud Infrastructures
    Balis, Bartosz
    Figiela, Kamil
    Malawski, Maciej
    Pawlik, Maciej
    Bubak, Marian
    [J]. PARALLEL PROCESSING AND APPLIED MATHEMATICS, PPAM 2015, PT I, 2016, 9573 : 281 - 290
  • [26] On the Security of Python']Python Virtual Machines: An Empirical Study
    Lin, Xinrong
    Hua, Baojian
    Fan, Qiliang
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 223 - 234
  • [27] Improving Security of Virtual Machines during Live Migrations
    Biedermann, Sebastian
    Zittel, Martin
    Katzenbeisser, Stefan
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 352 - 357
  • [28] A hybrid security model for virtual machines in cloud environment
    [J]. Shu, Zhaogang (zhaogang.shu@gmail.com), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10):
  • [29] Security Assessment of Virtual Machines in Open Source Clouds
    Donevski, Aleksandar
    Ristov, Sasko
    Gusev, Marjan
    [J]. 2013 36TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2013, : 1094 - 1099
  • [30] Controlling the deployment of virtual machines on clusters and clouds for scientific computing in CBRAIN
    Glatard, Tristan
    Rousseau, Marc-Etienne
    Rioux, Pierre
    Adalat, Reza
    Evans, Alan C.
    [J]. 2014 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2014, : 384 - 393