Deployment of virtual machines in Lock-Keeper

被引:0
|
作者
Cheng, Feng [1 ]
Meinel, Christoph [1 ]
机构
[1] Univ Potsdam, Hasso Plattner Inst, Postfach 900460, D-14440 Potsdam, Germany
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a remarkable realization of the simple idea "Physical Separation", the Lock-Keeper technology has been proven to be a practical approach to provide high-level security for a sensitive internal network by completely separating it with the less secure external network. The data exchange between the two separated networks is accomplished by the Lock-Keeper Secure Data Exchange software which is occupied by three PC-based Lock-Keeper components: INNER, OUTER and GATE. The SDE's application modules on INNER and OUTER provide specific network services to the external world through normal network connections and organize the network traffic into Lock-Keeper-mode units which can be transferred through the Lock-Keeper by its SDE's basic data exchange modules on INNER, OUTER and GATE. There is an extra data scanning module located on GATE to check the passing data contents. In this paper, a new implementation of the SDE software will be proposed based on the Virtual Machine technology. Application modules on INNER and OUTER are respectively replaced by some Virtual Machines. According to different requirements of corresponding applications, different configurations and resource assignments can be employed by these Virtual Machines. Such special-purpose Virtual Machines and their underlying host can be isolated from one another by the natural property of the Virtual Machine technology so that both the host and each single application can be easily restored in the case of destruction. In addition, a content scanning VM will be built on GATE to support offline scanning, configuration, updating and other useful extension.
引用
收藏
页码:147 / +
页数:3
相关论文
共 50 条
  • [31] Programming the Internet with virtual virtual machines
    Piumarta, I
    Ogel, F
    Khoury, C
    Folliot, B
    IC'2001: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS I AND II, 2001, : 709 - 715
  • [32] Parallax: Virtual Disks for Virtual Machines
    Meyer, Dutch T.
    Aggarwal, Gitika
    Cully, Brendan
    Lefebvre, Geoffrey
    Feeley, Michael J.
    Hutchinson, Norman C.
    Warfield, Andrew
    EUROSYS'08: PROCEEDINGS OF THE EUROSYS 2008 CONFERENCE, 2008, : 41 - 54
  • [33] Service deployment for virtual enterprises
    Yang, J
    van den Heuvel, WJ
    Papazoglu, MP
    PROCEEDINGS OF THE WORKSHOP ON INFORMATION TECHNOLOGY FOR VIRTUAL ENTERPRISES, ITVE 2001, 2001, 23 (06): : 107 - 115
  • [34] VIRTUAL TREE MACHINES
    BURTON, FW
    HUNTBACH, MM
    IEEE TRANSACTIONS ON COMPUTERS, 1984, 33 (03) : 278 - 280
  • [35] Virtual machines and consciousness
    Sloman, A
    Chrisley, R
    JOURNAL OF CONSCIOUSNESS STUDIES, 2003, 10 (4-5) : 133 - 172
  • [36] Virtual machines: implementations
    Popescu, Hadrian
    Natea, Cosmin
    Enachescu, Calin
    Crainicu, Bogdan
    6TH ROEDUNET INTERNATIONAL CONFERENCE, PROCEEDINGS, 2007, : 118 - 126
  • [37] Virtual Machines in Education
    Mateljan, Vladimir
    Juricic, Vedran
    Moguljak, Marko
    2014 37TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2014, : 603 - 607
  • [38] Virtual Machines INTRODUCTION
    Farkas, Keith I.
    Narayanaswami, Chandra
    Nieh, Jason
    IEEE PERVASIVE COMPUTING, 2009, 8 (04) : 6 - 7
  • [39] MICROPROGRAMMABLE VIRTUAL MACHINES
    BAGLEY, JD
    COMPUTER, 1976, 9 (02) : 38 - 42
  • [40] CONCEPT OF VIRTUAL MACHINES
    AUROUX, A
    HANS, C
    REVUE FRANCAISE D INFORMATIQUE DE RECHERCHE OPERATIONNELLE, 1968, 2 (15): : 45 - &