首页> 外文OA文献 >Secure Virtual Machine Migration in Cloud Data Centers
【2h】

Secure Virtual Machine Migration in Cloud Data Centers

机译:云数据中心中的安全虚拟机迁移

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

While elasticity represents a valuable asset in cloud computing environments, it may bring critical security issues. In the cloud, virtual machines (VMs) are dynamically and frequently migrated across data centers from one host to another. This frequent modification in the topology requiresudconstant reconfiguration of security mechanisms particularly as we consider, in terms of firewalls, intrusion detection/prevention as well as IPsec policies. However, managing manually complex security rules is time-consuming and error-prone. Furthermore, scale and complexity of data centers are continually increasing, which makes it difficult to rely on the cloud provider administrators to update and validate the security mechanisms.udIn this thesis, we propose a security verification framework with a particular interest in the abovementioned security mechanisms to address the issue of security policy preservation in a highly dynamic context of cloud computing. This framework enables us to verify that the global security policy after the migration is consistently preserved with respect to the initial one. Thus, we propose a systematic procedure to verify security compliance of firewall policies, intrusion detection/prevention, and IPsec configurations after VM migration. First, we develop a process algebra called cloud calculus, which allows specifying network topology and security configurations. Itudalso enables specifying the virtual machines migration along with their security policies.udThen, the distributed firewall configurations in the involved data centers are defined according to the network topology expressed using cloud calculus. We show how our verification problem can be reduced to a constraint satisfaction problem that once solved allows reasoning about firewall traffic filtering preservation. Similarly, we present our approach to the verification of intrusionuddetection monitoring preservation as well as IPsec traffic protection preservation using constraint satisfaction problem. We derive a set of constraints that compare security configurations before and after migration.udThe obtained constraints are formulated as constraint satisfaction problems and then submitted to a SAT solver, namely Sugar, in order to verify security preservation properties and to pinpoint the configuration errors, if any, before the actual migration of the security context and theudvirtual machine. In addition, we present case studies for the given security mechanisms in order to show the applicability and usefulness of our framework, and demonstrate the scalability of our approach.
机译:尽管弹性是云计算环境中的宝贵资产,但它可能会带来严重的安全问题。在云中,虚拟机(VM)在数据中心之间动态频繁地从一台主机迁移到另一台主机。拓扑结构的这种频繁修改要求对安全机制进行不必要的重新配置,特别是正如我们在防火墙,入侵检测/防御以及IPsec策略方面所考虑的那样。但是,手动管理复杂的安全规则既耗时又容易出错。此外,数据中心的规模和复杂性也在不断增加,这使得难以依靠云提供商的管理员来更新和验证安全机制。 ud本文中,我们提出了一种对上述安全性特别感兴趣的安全性验证框架。在高度动态的云计算环境中解决安全策略保留问题的机制。此框架使我们能够验证迁移后的全局安全策略相对于初始策略是否得到了一致保留。因此,我们提出了一种系统的过程,以在VM迁移后验证防火墙策略,入侵检测/预防和IPsec配置的安全合规性。首先,我们开发一个称为“云演算”的过程代数,它可以指定网络拓扑和安全配置。它也可以指定虚拟机迁移及其安全策略。然后,所涉及的数据中心中的分布式防火墙配置是根据使用云演算表示的网络拓扑定义的。我们展示了如何将我们的验证问题简化为约束满足问题,一旦解决该问题,就可以对防火墙流量过滤的保留进行推理。同样,我们提出了使用约束满足问题来验证入侵检测检测监视保留以及IPsec流量保护保留的方法。我们导出了一组约束,用于比较迁移前后的安全配置。 ud将获得的约束公式化为约束满足问题,然后提交给SAT解算器(即Sugar),以验证安全保留属性并查明配置错误, (如果有)在安全上下文和 uvirtual计算机的实际迁移之前。此外,我们将针对给定的安全机制进行案例研究,以展示我们框架的适用性和实用性,并展示我们方法的可扩展性。

著录项

  • 作者

    Eghtesadi Arash;

  • 作者单位
  • 年度 2013
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号