[1]杨 波,马 勇*,马志程,等.资源池安全接入管理关键技术研究[J].江西师范大学学报(自然科学版),2020,(06):639-643.[doi:10.16357/j.cnki.issn1000-5862.2020.06.16]
 YANG Bo,MA Yong*,MA Zhicheng,et al.The Study on Key Technology of Secure Access to the Resource Pool Management[J].Journal of Jiangxi Normal University:Natural Science Edition,2020,(06):639-643.[doi:10.16357/j.cnki.issn1000-5862.2020.06.16]
点击复制

资源池安全接入管理关键技术研究()
分享到:

《江西师范大学学报》(自然科学版)[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2020年06期
页码:
639-643
栏目:
信息科学与技术
出版日期:
2020-12-20

文章信息/Info

Title:
The Study on Key Technology of Secure Access to the Resource Pool Management
文章编号:
1000-5862(2020)06-0639-05
作者:
杨 波1马 勇2*马志程3邵诗韵2杨仕博3王明文2
1.国网甘肃省电力公司信息通信公司,甘肃 兰州 730050; 2.江西师范大学计算机信息工程学院,江西 南昌 330022; 3.甘肃同兴智能科技发展有限责任公司,甘肃 兰州 7300502
Author(s):
YANG Bo1MA Yong2*MA Zhicheng3SHAO Shiyun2YANG Shibo3WANG Mingwen2
1.State Grid Gansu Information and Telecommunication Company,Lanzhou Gansu 730050,China; 2.College of Computer and Information Engineering,Jiangxi Normal University,Nanchang Jiangxi 330022,China; 3.Gansu Shining Science and Technology Company Limitied,Lanzhou Gansu 730050,China
关键词:
云计算 服务器虚拟化 资源池 代理
Keywords:
cloud computing server virtualization resource pooling agent
分类号:
TP 319
DOI:
10.16357/j.cnki.issn1000-5862.2020.06.16
文献标志码:
A
摘要:
为保证在虚拟机中的桌面或服务器操作系统的安全运行,将安全工作划分为6个子任务,提出了以虚拟机管理器工作机制为技术基础、利用代理技术实现主控服务器和宿主服务器之间安全管控与审计,同时提出了虚拟机安全隔离的设计机制,从运行、CPU、内存、存储和网络5个方面分析了虚拟机的隔离方式,有效地实现了终端的安全接入管理与隔离运行,为安全审计、抗逃逸攻击等提供了基础安全保障机制.
Abstract:
In order to ensure the safe operation of the desktop or operating system in the virtual machine,the security work is divided into six parts.The working mechanism of virtual machine manager is put forward,and the security control and audit between host server and hosting server are realized by proxy technology.The design mechanism of virtual machine security isolation is proposed,and the isolation mode of virtual machine is analyzed in five aspects of operation,CPU,memory,storage and network.The safe access management and isolation operation of the terminal are implemented effectively,providing basic security mechanism for security audit and anti-escape attack.

参考文献/References:

[1] Curry S,Darbyshire J,Fisher D W,et al.Infrastructure security:getting to the bottom of compliance in the cloud[J].RSA Security Brief,2010,45(3):196-204.
[2] Kaur P J,Kaushal S.Security concerns in cloud computing[M].Berlin:Heidelberg,2011:103-112.
[3] Feng Dengguo,Zhang Min,Zhang Yan,et al.Study on cloud computing security[J].Journal of Software,2011,22(1):71-83.
[4] Bhardwaj S,Jain L,Jain S.Cloud computing:a study of infrastructure as a service(IAAS)[J].International Journal of Engineering and Information Technology,2010,2(1):60-63.
[5] Mell P,Grance T.The NIST definition of cloud computing[EB/OL].[2019-10-17].https://www.researchgate.net/profile/Ghulam_Muhammad2/publication/272375651_Automatic_speech_recognition_using_interlaced_derivative_pattern_for_cloud_based_healthcare_system/links/569d2eb308ae950bd7a66995.pdf.
[6] Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
[7] Wang Yuding,Yang Jiahai,Xu Cong,et al.Survey on access control technologies for cloud computing[J].Journal of Software,2015,26(5):1129-1150.
[8] Thomas R K,Sandhu R S.Task-based authorization controls(TBAC):a family of models for active and enterprise-oriented authorization management[M].Boston:Springer,1998:166-181.
[9] Deng Jibo,Fan Hong.Task-based access control model[J].Journal of Software,2003,14(1):76-82.
[10] 赵宏斌,白开峰,崔丙锋,等.基于DAMT的企业级数据仓库建设关键路径研究[J].江西师范大学学报:自然科学版,2018,42(6):88-92.
[11] Wang Xiaowei,Zhao Yiming.A task-role-based access control model for cloud computing[J].Computer Engineering,2012,38(24):9-13.
[12] Amazon.Using bucket policies and user policies[EB/OL].[2019-10-11].http://docs.aws.amazon.com/AmazonS3/latest/dev/UsingIAMPolicies.html
[13] Baike.Windows azure[EB/OL].[2019-10-11].http://baike.baidu.com/view/ 1997158.htm.
[14] Google.Security whitepaper:google apps messaging and collaboration[EB/OL].[2019-10-11].https://www.tradepub.com/free/w_aaaa2180/.
[15] NASA,Rackspace.OpenStack[EB/OL].[2019-10-11].http://www.openstack.org/.
[16] Apache.CloudStack[EB/OL].[2019-10-11].http://cloudstack.apache.org/.
[17] Eucalyptus Systems Inc.Eucalyptus[EB/OL].[2019-10-11].https://www.eucalyptus.com/.

相似文献/References:

[1]陈军,卢涵宇,姚丹丹.一种基于处理时间的Map/Reduce动态均衡调度算法[J].江西师范大学学报(自然科学版),2013,(01):51.
 CHEN Jun,LU Han-yu,YAO Dan-dan.An Algorithm for Map/Reduce Dynamic Loading Balancing Policy Based on Processing Time[J].Journal of Jiangxi Normal University:Natural Science Edition,2013,(06):51.
[2]魏丹丹,邱乐兴.基于Web3.0的网络教学个性化服务平台构建[J].江西师范大学学报(自然科学版),2013,(06):584.
 WEI Dan-dan,QIU Le-xing.Network Teaching Personalized Service Platform Construction Based on Web3.0[J].Journal of Jiangxi Normal University:Natural Science Edition,2013,(06):584.
[3]周莉,王珏,周勇.云计算环境下可视化探索式搜索引擎的研究[J].江西师范大学学报(自然科学版),2015,(06):637.
 ZHOU Li,WANG Jue,ZHOU Yong.The Research on Visual Exploratory Search Engine in Cloud Computing Environment[J].Journal of Jiangxi Normal University:Natural Science Edition,2015,(06):637.

备注/Memo

备注/Memo:
收稿日期:2020-05-16
基金项目:国家自然科学基金(61876074),江西省重点研发计划(20181A50029)和江西省重大科技研发计划(20192AEI91005)资助项目.
通信作者:马 勇(1977-),男,河南焦作人,教授,博士,主要从事云计算以及人工智能研究.E-mail:mywuda@126.com
更新日期/Last Update: 2020-12-20