{"title":"设计并实现了一种基于Xen云环境的安全内存隔离方法","authors":"Y. Liu","doi":"10.1109/ICSESS.2016.7883189","DOIUrl":null,"url":null,"abstract":"In view of the present cloud security problem which has been becoming one of the major obstacles hindering the development of the cloud increasingly, put forward a kind of technology implementation of memory security isolation based on Xen. And based on the Xen virtual machine monitor system, analysis the implementation approach of memory virtualization in the model, using Xen virtualization system memory's super calls and authorization table mechanism, design the security memory isolation system with the basics of virtual machine manager internal implementation of access control module (ACM). Experiments show that the system can effectively isolate the memory data between different customer domain OS illegal access.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Design and implement a safe method for isolating memory based on Xen cloud environment\",\"authors\":\"Y. Liu\",\"doi\":\"10.1109/ICSESS.2016.7883189\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In view of the present cloud security problem which has been becoming one of the major obstacles hindering the development of the cloud increasingly, put forward a kind of technology implementation of memory security isolation based on Xen. And based on the Xen virtual machine monitor system, analysis the implementation approach of memory virtualization in the model, using Xen virtualization system memory's super calls and authorization table mechanism, design the security memory isolation system with the basics of virtual machine manager internal implementation of access control module (ACM). Experiments show that the system can effectively isolate the memory data between different customer domain OS illegal access.\",\"PeriodicalId\":175933,\"journal\":{\"name\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSESS.2016.7883189\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2016.7883189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Design and implement a safe method for isolating memory based on Xen cloud environment
In view of the present cloud security problem which has been becoming one of the major obstacles hindering the development of the cloud increasingly, put forward a kind of technology implementation of memory security isolation based on Xen. And based on the Xen virtual machine monitor system, analysis the implementation approach of memory virtualization in the model, using Xen virtualization system memory's super calls and authorization table mechanism, design the security memory isolation system with the basics of virtual machine manager internal implementation of access control module (ACM). Experiments show that the system can effectively isolate the memory data between different customer domain OS illegal access.