虚拟化环境下安全多级访问控制机制研究与实现
[Abstract]:In today's society, information has become a very important strategic resource, so the information security and security ability of a country also becomes a good reflection of its comprehensive national strength. On the one hand, since the level of science and technology and information technology are at the stage of unprecedented prosperity, the information industry has become the first-largest industry in the world today; on the other hand, the frequency of the event of information security is increasing, and the problem of information security is urgent. With the development of the Internet, especially the emergence of network applications such as cloud computing and distributed system, people's life becomes more and more convenient because more and more data can be obtained from the network. As the people's dependence on the network is gradually enhanced, the security requirements of the data obtained in the network are becoming more and more high. At the same time, cloud computing provides a more open and more interactive network environment due to virtualization technology as one of the key technologies for building their infrastructure, and people are increasingly inclined to get all the required data and information from the cloud computing network. Because the cloud computing network is different from the traditional network system, and the traditional access control technology such as the firewall is difficult to prevent the attack of the active leakage and the malicious Trojan horse, the traditional access control technology cannot be completely applied to the virtualized environment. Therefore, how to enable the data in the virtualized environment to be fully shared and to realize the strict access control is a difficult problem to be overcome in the present time. In general, the security access control model for a conventional system is mainly controlled by setting user rights for data access. Such an access control mechanism makes the management control of the data excessively dependent on the user, resulting in an attack that causes the system to be attacked not only by some external attackers, but sometimes from some internal users. In order to overcome the disadvantages of this access control mechanism, the multi-level security model comes into being. The multi-level security model utilizes the management mechanism of the user and the data to separate the autonomous access control of the data to the mandatory access control, so that the security access control of the data is realized to a certain extent. So far, many multi-level security models have been used in different environments, such as army, commerce, etc., but often because of the inrationality and fuzziness of the model semantics, the utility support is not enough, and the application is not wide. In this paper, on the basis of multi-level relationship model MLR, a general-purpose entity-based multi-level relationship model E-MLR model is proposed. In the E-MLR model, we re-define the semantics and the statement operations to ensure secure isolation between different entities within a traditional network, as well as secure communications within the entity. Then, using the KVM virtual machine as the research reference environment, the E-MLR model is extended in the virtualized environment, and the virtual multi-level packet safety model V-MGSM is put forward for the data access security requirement between the virtual machines. The purpose of the invention is to group the virtual machine according to the corresponding entity, and is used for controlling different groups, and the communication process between the virtual machines in the same group and the memory sharing problem in the virtualized environment. On the basis of this, this paper gives the implementation of the access control mechanism in the KVM environment of the virtualization platform and the test results. It mainly includes the following contents: 1. Based on the MLR model, a general-purpose entity-based multi-level relationship model, E-MLR, is proposed to re-define the semantic of the data and put forward the idea of data borrowing. then, four general data operation instructions are defined so as to realize that the low-level user cannot modify the target of the high-level user view, and finally the purpose of system information security is achieved; The universal E-MLR model is extended into a virtualization system, and a secure access control mechanism for communication among virtual machines in a virtualized environment is established, a V-MGSM model is proposed and data interpretation, an integrity property, an operation instruction and a security certificate are provided; Under the KVM virtual machine platform, the implementation process and the test result of the virtual machine access control mechanism are given, and the result of the demonstration is that the V-MGSM model we propose is correct and safe.
【学位授予单位】:西安电子科技大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.08
【相似文献】
相关期刊论文 前10条
1 钮小勇;韩桂明;;访问控制机制在数据库中的应用研究[J];科技传播;2010年21期
2 徐小龙;窦孝晨;;一种对等社区网络多层次可靠访问控制机制[J];计算机技术与发展;2011年04期
3 关德君;王吉;;基于角色的访问控制机制在考试系统中的研究与应用[J];科技信息;2013年09期
4 郑卫斌,张德运,李胜磊;防火墙的动态访问控制机制[J];计算机工程与应用;2003年32期
5 雷芸;刘恒;;用动态代理实现网上考试系统的访问控制机制[J];玉林师范学院学报(自然科学版);2007年03期
6 张志军;郭渊博;刘伟;吕金娜;袁顺;;容忍入侵服务器中组通信认证与访问控制机制[J];计算机工程与设计;2009年21期
7 刘波;郭少辉;陈晖;王海涛;陈磊;;数据统一访问中访问控制机制的研究[J];军事通信技术;2013年03期
8 赵洪彪;;访问控制机制概述[J];计算机安全;2002年12期
9 韩兰胜,刘辉;基于角色的访问控制中角色的划分[J];湖北工学院学报;2002年03期
10 黄昆;;认证和授权体系趋于统一[J];中国计算机用户;2007年42期
相关会议论文 前4条
1 周钢;;操作系统访问控制机制的安全性分析和测试[A];第14届全国计算机安全学术交流会论文集[C];1999年
2 尚卫卫;张卫民;;一种气象领域的安全模型及其访问控制机制[A];2010年全国通信安全学术会议论文集[C];2010年
3 吴波;戴跃发;顾亚强;;SOA环境下访问控制机制研究[A];中国电子学会第十六届信息论学术年会论文集[C];2009年
4 周集良;王正华;;基于CIST的访问控制器设计与实现[A];第十九次全国计算机安全学术交流会论文集[C];2004年
相关重要报纸文章 前4条
1 ;发布新框架以改善云服务[N];网络世界;2013年
2 《网络世界》记者 于翔;CA AppLogic 3.0快速构建云应用[N];网络世界;2012年
3 李瀛寰;3Com推出第三层无线LAN安全解决方案[N];中国计算机报;2000年
4 CPW记者 曾宪勇;Sinfor M5100-AC访问控制机制完善[N];电脑商报;2005年
相关博士学位论文 前3条
1 程勇;云存储中密文访问控制机制性能优化关键技术研究[D];国防科学技术大学;2013年
2 颜学雄;Web服务访问控制机制研究[D];解放军信息工程大学;2008年
3 涂山山;云计算环境中访问控制的机制和关键技术研究[D];北京邮电大学;2014年
相关硕士学位论文 前10条
1 薛莹芳;虚拟化环境下安全多级访问控制机制研究与实现[D];西安电子科技大学;2014年
2 马佳敏;基于固件的虚拟化系统集成访问控制机制研究与实现[D];上海交通大学;2014年
3 李y浻,
本文编号:2363530
本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2363530.html