簡易檢索 / 詳目顯示

研究生: 廖柏翔
Liao, Bo-Siang
論文名稱: 對於雲端虛擬機器執行環境的即時稽核
Efficient Real-Time Audit for Execution Environment of Virtual Machine in Cloud System
指導教授: 黃冠寰
Hwang, Gwan-Hwan
學位類別: 碩士
Master
系所名稱: 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 中文
論文頁數: 31
中文關鍵詞: 雲端運算虛擬機器即時稽核違約證明機制
英文關鍵詞: Cloud computiong, Virtual machine, Real-time audit, Proof of Violation
DOI URL: https://doi.org/10.6345/NTNU202204157
論文種類: 學術論文
相關次數: 點閱:57下載:9
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 今日雲端提供租借虛擬機器的服務日漸普及,用戶可以在虛擬機器上運行任何自己的軟體或應用程式。然而雲端服務提供商只有提供硬體的租借,將虛擬機器交由用戶全權自由的使用,並不會提供額外的安全性檢驗服務。然而用戶並不知道當他們在暫停使用虛擬機器的情況下,雲端服務提供商是否有安全地保存用戶的虛擬機器。所以在使用虛擬機器作為開發軟體以及其他服務時,我們需要對雲端虛擬機器平台做一個即時的完整性驗證,才能夠確保開發資料以及個人資料不會因為雲端服務提供商不當的保存而損毀以及外洩。
    本篇論文提出了一個即時稽核架構,雲端服務提供商在租借虛擬機器給予用戶時,能夠在用戶執行軟體之前就能夠即時性的發現因為雲端服務提供商不當疏忽而造成虛擬機器檔案損毀或者被篡改,希望能夠達到在每次使用VM時都能夠達到快速的即時性稽核,我們將使用Full Binary Hash Tree來實作我們的架構。

    Today's cloud services provide rent virtual machines growing popularity, users can run any of their own software or applications on a virtual machine. We present a real-time audit architecture, cloud service providers to give users when renting a virtual machine that can execute software before the user will be able to find because of the immediacy of the cloud service provider improper negligence virtual machine files are corrupted or tampered with , hoping to reach every time you use VM can achieve rapid immediacy audit, we will use the Full Binary Hash Tree to implement our architecture.

    摘要 i 誌謝 ii 附圖目錄 iv 附表目錄 v 第一章 簡介 1 第一節 雲端運算 1 第二節 虛擬機器 1 第三節 證明違約協定以及即時稽核 2 第四節 目標 4 第五節 過往的作法 4 第六節 論文大鋼 5 第二章 即時稽核結構架構 6 第一節 Merkle Tree 6 第二節:Full Binary Hash Tree 11 第三節 稽核檔案 13 第四節 更新檔案 15 第三章 相關實驗數據 17 第四章 相關研究探討 28 第五章 結論 29 參考著作 30

    [1]“Amazon EC2,” http://aws.amazon.com/tw/ec2/
    [2]“Google App Engine,”https://cloud.google.com/appengine/docs
    [3]“Amazon AWS,” http://aws.amazon.com/tw/
    [4]“Gmail”, https://mail.google.com/mail
    [5]“Youtube”, https://www.youtube.com/
    [6]“JAVA Virtual Machine”, https://www.oracle.com/java/index.html
    [7]“VirtualBox”, https://www.virtualbox.org/
    [8]Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng. “Real-time proof of violation for cloud storage,” Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on IEEE, 2014.
    [9]Gwan-Hwan Hwang, Hung-Fu Chen. “Efficient Real-time Auditing and Proof of Violation for Cloud Storage Systems,” Cloud Computing (Cloud),2016 9th IEEE International Conference on Cloud Computing on IEEE ,2016.
    [10]Mishra, Umakant. “Methods of Virus detection and their limitations,” Available
    at SSRN 1916708 (2010)
    [11]Gwan-Hwan Hwang, Jenn-ZjonePeng, Wei-SianHuang. “A Mutual Nonrepudiation
Protocol for Cloud Storage with Interchangeable Accesses of a Single Account from Multiple Devices,” The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2013), Melbourne, Australia, 16-18 July. 

    [12]Ibrahim, Amani S, James Hamlyn-Harris, John Grundy and Mohamed Almorsy. “Cloudsec: a security monitoring appliance for virtual machines in the iaas cloud model,” Network and System Security (NSS), 2011 5th International Conference on. IEEE, 2011.
    [13]Wei, Jinpeng, Xiaolan Zhang, Glenn Ammons, Vasanth Bala, Peng Ning. “Managing security of virtual machine images in a cloud environment,” Proceedings of the 2009 ACM workshop on Cloud computing security. ACM, 2009.
    [14]Garfinkel, Tal, and Mendel Rosenblum. “A Virtual Machine Introspection Based Architecture for Intrusion Detection.” NDSS. Vol. 3. 2003. 

    Haeberlen, P.Aditya, R.Rodrigues, P.Druschel. “Accountable Virtual Machines, “In Proc. of OSDI, 2010.
    [15]Rosenblum, Mendel, and Tal Garfinkel. "Virtual machine monitors: Current technology and future trends." Computer 38.5 (2005): 39-47.
    [16]Garfinkel Tal, Ben Pfaff, Jim Chow, Mendel Rosenblum, Dan Boneh. “Terra: A virtual machine-based platform for trusted computing.” ACM SIGOPS Operating Systems Review. Vol. 37. No. 5. ACM, 2003.

    下載圖示
    QR CODE