Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: Cloud security, memory isolation, Xen, virtual machine.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1128149

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1273

References:


[1] Barham P, Dragovic B,Farser K, et al, Xen and the Art of Virtualization (J). ACM, 2003(08):164-177
[2] Intel. Intel Virtualization Technology: Hardware support for efficient processor virtualization(s) Intel
[3] Liangliang Huang, Jun Han, Lunwei Wang. Research on (J). security communication mechanism of Xen hardware virtual machine based on computer security,2010(03): 30-46.
[4] Dengguo Feng. Open the security of Cloud Computing Era(J) Information network security, 2011(03): 1-2
[5] Xiaoqiong Guo. Research on Xen virtual machine and memory management (d). Shanghai: Shanghai Jiao Tong University, 2008, 50-63
[6] Reiner Sailer, Trent Jaeger, Enriquillo Valdez, et al, Building a MAC-Based Security Architecture for the XEN Open-Source Hypervisor(c)//21st Annual Computer Security Applications Conference, December 2005, Arizona, 2005.
[7] David C. The Definitive Guide to the Xen Hypervisor (M). Prentice Hall, 2008
[8] University of Cambridge. XEN Interface Manual(M).UK, University of Cambridge,2006:19-20.
[9] Avi Kiviy, Yaniv Kamay, Dor Laor, et al. VM: The linux virtual machine monitor (C) proceedings of the Linux Symposium, Canada, June 2007.