研究生: |
廖柏翔 Liao, Bo-Siang |
---|---|
論文名稱: |
對於雲端虛擬機器執行環境的即時稽核 Efficient Real-Time Audit for Execution Environment of Virtual Machine in Cloud System |
指導教授: |
黃冠寰
Hwang, Gwan-Hwan |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2016 |
畢業學年度: | 104 |
語文別: | 中文 |
論文頁數: | 31 |
中文關鍵詞: | 雲端運算 、虛擬機器 、即時稽核 、違約證明機制 |
英文關鍵詞: | Cloud computiong, Virtual machine, Real-time audit, Proof of Violation |
DOI URL: | https://doi.org/10.6345/NTNU202204157 |
論文種類: | 學術論文 |
相關次數: | 點閱:136 下載:10 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
今日雲端提供租借虛擬機器的服務日漸普及,用戶可以在虛擬機器上運行任何自己的軟體或應用程式。然而雲端服務提供商只有提供硬體的租借,將虛擬機器交由用戶全權自由的使用,並不會提供額外的安全性檢驗服務。然而用戶並不知道當他們在暫停使用虛擬機器的情況下,雲端服務提供商是否有安全地保存用戶的虛擬機器。所以在使用虛擬機器作為開發軟體以及其他服務時,我們需要對雲端虛擬機器平台做一個即時的完整性驗證,才能夠確保開發資料以及個人資料不會因為雲端服務提供商不當的保存而損毀以及外洩。
本篇論文提出了一個即時稽核架構,雲端服務提供商在租借虛擬機器給予用戶時,能夠在用戶執行軟體之前就能夠即時性的發現因為雲端服務提供商不當疏忽而造成虛擬機器檔案損毀或者被篡改,希望能夠達到在每次使用VM時都能夠達到快速的即時性稽核,我們將使用Full Binary Hash Tree來實作我們的架構。
Today's cloud services provide rent virtual machines growing popularity, users can run any of their own software or applications on a virtual machine. We present a real-time audit architecture, cloud service providers to give users when renting a virtual machine that can execute software before the user will be able to find because of the immediacy of the cloud service provider improper negligence virtual machine files are corrupted or tampered with , hoping to reach every time you use VM can achieve rapid immediacy audit, we will use the Full Binary Hash Tree to implement our architecture.
[1]“Amazon EC2,” http://aws.amazon.com/tw/ec2/
[2]“Google App Engine,”https://cloud.google.com/appengine/docs
[3]“Amazon AWS,” http://aws.amazon.com/tw/
[4]“Gmail”, https://mail.google.com/mail
[5]“Youtube”, https://www.youtube.com/
[6]“JAVA Virtual Machine”, https://www.oracle.com/java/index.html
[7]“VirtualBox”, https://www.virtualbox.org/
[8]Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng. “Real-time proof of violation for cloud storage,” Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on IEEE, 2014.
[9]Gwan-Hwan Hwang, Hung-Fu Chen. “Efficient Real-time Auditing and Proof of Violation for Cloud Storage Systems,” Cloud Computing (Cloud),2016 9th IEEE International Conference on Cloud Computing on IEEE ,2016.
[10]Mishra, Umakant. “Methods of Virus detection and their limitations,” Available
at SSRN 1916708 (2010)
[11]Gwan-Hwan Hwang, Jenn-ZjonePeng, Wei-SianHuang. “A Mutual Nonrepudiation
Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices,” The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2013), Melbourne, Australia, 16-18 July.
[12]Ibrahim, Amani S, James Hamlyn-Harris, John Grundy and Mohamed Almorsy. “Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model,” Network and System Security (NSS), 2011 5th International Conference on. IEEE, 2011.
[13]Wei, Jinpeng, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning. “Managing security of virtual machine images in a cloud environment,” Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009.
[14]Garfinkel, Tal, and Mendel Rosenblum. “A Virtual Machine Introspection Based Architecture for Intrusion Detection.” NDSS. Vol. 3. 2003.
Haeberlen, P.Aditya, R.Rodrigues, P.Druschel. “Accountable Virtual Machines, “In Proc. of OSDI, 2010.
[15]Rosenblum, Mendel, and Tal Garfinkel. "Virtual machine monitors: Current technology and future trends." Computer 38.5 (2005): 39-47.
[16]Garfinkel Tal, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh. “Terra: A virtual machine-based platform for trusted computing.” ACM SIGOPS Operating Systems Review. Vol. 37. No. 5. ACM, 2003.