CN105335212A - Method for controlling cloud computing mandatory access based on distributed implementation - Google Patents

Method for controlling cloud computing mandatory access based on distributed implementation Download PDF

Info

Publication number
CN105335212A
CN105335212A CN201510691631.7A CN201510691631A CN105335212A CN 105335212 A CN105335212 A CN 105335212A CN 201510691631 A CN201510691631 A CN 201510691631A CN 105335212 A CN105335212 A CN 105335212A
Authority
CN
China
Prior art keywords
access control
module
virtual machine
access
cloud computing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510691631.7A
Other languages
Chinese (zh)
Inventor
曹玲玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Electronic Information Industry Co Ltd
Original Assignee
Inspur Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Electronic Information Industry Co Ltd filed Critical Inspur Electronic Information Industry Co Ltd
Priority to CN201510691631.7A priority Critical patent/CN105335212A/en
Publication of CN105335212A publication Critical patent/CN105335212A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors

Abstract

The invention discloses a method for controlling cloud computing mandatory access based on distributed implementation. An implementation process of the method comprises the step of setting two function modules on a computing node, wherein the two function modules are an access control configuration module and an access control execution module; the access control configuration module works in a host operating system of each computing point and is responsible for communicating with a cloud control node safety management module and receiving a command to complete configuration and management on an access control execution mechanism of the computing node; the access control execution module is responsible for specific execution of the access control execution mechanism, works in a Hypervisor layer and is responsible for monitoring the access from a client virtual machine to system resources. Compared with the prior art, the method for controlling the cloud computing mandatory access based on the distributed implementation, disclosed by the invention, has the advantages that a more comprehensive and complete view angle can be obtained for monitoring progress establishment of the virtual machine in the cloud, so that an access control mechanism can be configured to protect the virtual machine at the beginning of the life cycle of the virtual machine, the practicability is high, and the promotion is easy.

Description

A kind of cloud computing forced access control method based on distributed enforcement
Technical field
The present invention relates to field of computer technology, specifically a kind of practical, based on the cloud computing forced access control method of distributed enforcement.
Background technology
Cloud computing is a kind of computation schema of the mass participation based on internet, and its computational resource comprises computing power, storage capacity, interaction capabilities etc., is all dynamic, has been virtualized, and be that the mode of serving provides.Under the cloud computing environment that this is special, how ensureing the safety of the data be stored on cloud, will be the large problem that cloud computing faces.In addition, the another one feature opening of cloud computing is similarly cloud computing and brings challenge safely.Opening is mainly reflected in the opening that the opening of service for user and internal interface externally call.Open lower Authentication mechanism is relatively weak, and this just makes malicious user can enter cloud computing environment by legal approach and carry out attacking to steal the information of needs, and optimum cloud computing environment also may be used for improper purposes by disabled user.Therefore, to improving mobile Internet security technic system, the mobile Internet safety problem under cloud computing application model and key safety technical research, ensure that mobile Internet evolution has great importance safely.
Internet flourish, for the shared of information resources provides more perfect means, enterprise also will stop unauthorized user to the access of enterprise's sensitive information while information resources share.The object of access control is the safety in order to protect enterprise's information of Storage and Processing in infosystem.Access control can be divided into self contained navigation and the large class of forced symmetric centralization two.
Self contained navigation, refers to that the access object (file, tables of data etc.) being had the right to create self by user conducts interviews, and can will authorize other users to the access right of these objects and regain its access rights from the user of granted rights.
Forced symmetric centralization, refer to the mandatory control of the object that user creates being unified by system (the security of system person by arranging specially), determine which user can carry out the access of what OS Type to which object according to the rule of regulation, even founder user, after establishment object, also may have no right to access this object.
Access control model is a kind of angle from access control, describes security system, sets up the method for security model.The access control model of current comparative maturity mainly contains: object-based access control, task-based access control, access control based roles.
The different many tenants shared computation resources being exactly opening and bringing that cloud computing Intel Virtualization Technology is maximum from traditional virtualization, whole virtual platform or guest virtual machine are subject to malicious user and will significantly improve from the possibility of internaling attack.At present, the virtual major security threat faced of cloud computing has virtual machine escape etc.In traditional virtual technology, escape for virtual machine and mostly adopt the mode of monitoring to find and stop dangerous generation.The Hypervisor layer that a kind of thinking of monitoring mechanism is provided by virtual machine environment is monitored it outside environment residing for guest virtual machine.This kind of mechanism can effectively be protected safety component to exempt from and distort, and the impact of this mode on monitoring environment is less simultaneously, facilitates transparent realization, the compatibility of system also has superiority.
But cloud computing and conventional individual virtualized environment framework is different, control is shifted to control joint Controller by Hypervisor.Traditional virtual machine monitoring Mechanism Design is in computing node Hypervisor, be difficult to effectively be connected with Virtual Machine Manager control flow on cloud Controlling vertex, there will be theft-resistant link chain fracture and the safety of the whole life cycle of virtual machine cannot be ensured, can not play a role in cloud computing scene well.Based on this; a kind of operating system security based on U-Key is now provided to reinforce the cloud computing forced access control method based on distributed enforcement of software; the method adopts new cloud computing virtual machine monitoring mechanism; this mechanism one centralized management; the monitoring mechanism of distributed enforcement, in Controlling vertex increase to the management of computing node monitoring mechanism and configuration, and gets involved virtual machine creating flow process; there is provided protection to the whole life cycle of virtual machine, and the concrete execution of access control is still on computing node.
Summary of the invention
Technical assignment of the present invention is for above weak point, provide a kind of practical, based on the cloud computing forced access control method of distributed enforcement.
Based on a cloud computing forced access control method for distributed enforcement, its specific implementation process is: on computing node, arranges two functional modules, i.e. access control configuration module and access control execution module; Wherein:
Access control configuration module is operated in the host operating system of each computing node, is responsible for communicating with cloud Controlling vertex safety management module, receives the configuration and management of having ordered the access control execution mechanism of this computing node;
Access control execution module is responsible for the concrete execution of access control mechanisms, operates in Hypervisor layer, and access control execution module is responsible for monitoring the access of guest virtual machine to system resource.
The specific works process of described access control configuration module is:
Receive order and data that Controlling vertex safety management module sends, comprise the interpolation of policy data and more newer command, user virtual machine label;
After communication module receives these orders, process is carried out to these data and calling interface deployment Hypervisor;
Order complete after, communication module obtains result that execution module returns or data, then packs result or data, is sent to the administration module of Controlling vertex.
The course of work of access control execution module is, on computing node, forced symmetric centralization is carried out to the access of resources of virtual machine by Hook Function, when the virtual machine of computing node needs to conduct interviews to any system resource, access control execution module intercepts and captures this request of access, and the security strategy loaded according to configuration module afterwards judges whether to allow this access.
A kind of cloud computing forced access control method based on distributed enforcement of the present invention, has the following advantages:
A kind of cloud computing forced access control method based on distributed enforcement of the present invention, based on centralized management, distributed enforcement, performs at computing node virtualization layer, directly monitors virtual machine to the access of virtual resource; But cloud management node is present in the management work of access control, so just can has more comprehensively complete visual angle monitoring virtual machine visioning procedure in cloud, thus can start to protect it with regard to configuration access controlling mechanism in virtual machine life cycle; In Hypervisor, virtual machine adds Hook Function in the accessing operation process of virtual resource, and when virtual machine needs to conduct interviews to virtual resource, Hook Function can intercept and capture this request of access, and judges whether virtual machine has access rights; The object of access control mechanisms finds malicious user behavior, realizes the protection to virtual resource; Information tomography problem when monitoring mechanism operates in computing node when forcing access mechanism to solve general virtual machine monitoring mechanism to be used in cloud environment based on the cloud computing of distributed enforcement and between Controlling vertex, practical, be easy to promote.
Accompanying drawing explanation
Accompanying drawing 1 is access control configuration module workflow diagram.
Accompanying drawing 2 is access control execution module flowchart.
Embodiment
Below in conjunction with the drawings and specific embodiments, the invention will be further described.
The invention provides a kind of cloud computing forced access control method based on distributed enforcement, as shown in accompanying drawing 1, Fig. 2, its specific implementation process is: on computing node, arranges two functional modules, i.e. access control configuration module and access control execution module; Wherein:
Access control configuration module is operated in the host operating system Dom0 of each computing node, be responsible for communicating with cloud Controlling vertex safety management module, receive the configuration and management of having ordered the access control execution mechanism of this computing node, this module of access control configuration module is by one of critical component realizing access control in cloud computing environment, serve Link role, access control configuration module flow process as shown in Figure 1.
The specific works process of described access control configuration module is:
Receive order and data that Controlling vertex safety management module sends, comprise the interpolation of policy data and more newer command, user virtual machine label;
After communication module receives these orders, process is carried out to these data and calling interface deployment Hypervisor;
Order complete after, communication module obtains result that execution module returns or data, then packs result or data, is sent to the administration module of Controlling vertex.
Access control execution module is responsible for the concrete execution of access control mechanisms, operates in Hypervisor layer, and access control execution module is responsible for monitoring the access of guest virtual machine to system resource.
The course of work of access control execution module is, on computing node, forced symmetric centralization is carried out to the access of resources of virtual machine by Hook Function, when the virtual machine of computing node needs to conduct interviews to any system resource, access control execution module intercepts and captures this request of access, the security strategy loaded according to configuration module afterwards judges whether to allow this access, and access control workflow as shown in Figure 2.
Above-mentioned embodiment is only concrete case of the present invention; scope of patent protection of the present invention includes but not limited to above-mentioned embodiment; claims of any a kind of cloud computing forced access control method based on distributed enforcement according to the invention and the those of ordinary skill of any described technical field to its suitable change done or replacement, all should fall into scope of patent protection of the present invention.

Claims (3)

1. based on a cloud computing forced access control method for distributed enforcement, it is characterized in that, its specific implementation process is:
On computing node, two functional modules are set, i.e. access control configuration module and access control execution module; Wherein:
Access control configuration module is operated in the host operating system of each computing node, is responsible for communicating with cloud Controlling vertex safety management module, receives the configuration and management of having ordered the access control execution mechanism of this computing node;
Access control execution module is responsible for the concrete execution of access control mechanisms, operates in Hypervisor layer, and access control execution module is responsible for monitoring the access of guest virtual machine to system resource.
2. a kind of cloud computing forced access control method based on distributed enforcement according to claim 1, it is characterized in that, the specific works process of described access control configuration module is:
Receive order and data that Controlling vertex safety management module sends, comprise the interpolation of policy data and more newer command, user virtual machine label;
After communication module receives these orders, process is carried out to these data and calling interface deployment Hypervisor;
Order complete after, communication module obtains result that execution module returns or data, then packs result or data, is sent to the administration module of Controlling vertex.
3. a kind of cloud computing forced access control method based on distributed enforcement according to claim 1, it is characterized in that, the course of work of described access control execution module is, on computing node, forced symmetric centralization is carried out to the access of resources of virtual machine by Hook Function, when the virtual machine of computing node needs to conduct interviews to any system resource, access control execution module intercepts and captures this request of access, and the security strategy loaded according to configuration module afterwards judges whether to allow this access.
CN201510691631.7A 2015-10-23 2015-10-23 Method for controlling cloud computing mandatory access based on distributed implementation Pending CN105335212A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510691631.7A CN105335212A (en) 2015-10-23 2015-10-23 Method for controlling cloud computing mandatory access based on distributed implementation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510691631.7A CN105335212A (en) 2015-10-23 2015-10-23 Method for controlling cloud computing mandatory access based on distributed implementation

Publications (1)

Publication Number Publication Date
CN105335212A true CN105335212A (en) 2016-02-17

Family

ID=55285771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510691631.7A Pending CN105335212A (en) 2015-10-23 2015-10-23 Method for controlling cloud computing mandatory access based on distributed implementation

Country Status (1)

Country Link
CN (1) CN105335212A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107111511A (en) * 2016-03-25 2017-08-29 深圳前海达闼云端智能科技有限公司 Access control method, device and system
CN107547258A (en) * 2017-07-18 2018-01-05 新华三云计算技术有限公司 The implementation method and device of a kind of network strategy
CN108833332A (en) * 2018-04-11 2018-11-16 广东省卫生厅政务服务中心 Multi-tenant access control method based on hypervisor
CN109902497A (en) * 2019-02-26 2019-06-18 南威软件股份有限公司 A kind of access authority management method and system towards big data cluster

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452397A (en) * 2008-11-27 2009-06-10 上海交通大学 Forced access control method and apparatus in virtual environment
CN103997502A (en) * 2014-06-05 2014-08-20 浪潮电子信息产业股份有限公司 Safety enhanced model designing method based on cloud computing data center
CN104573553A (en) * 2014-12-30 2015-04-29 中国航天科工集团第二研究院七O六所 Xen-oriented memory sharing security isolation method for virtual machines

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101452397A (en) * 2008-11-27 2009-06-10 上海交通大学 Forced access control method and apparatus in virtual environment
CN103997502A (en) * 2014-06-05 2014-08-20 浪潮电子信息产业股份有限公司 Safety enhanced model designing method based on cloud computing data center
CN104573553A (en) * 2014-12-30 2015-04-29 中国航天科工集团第二研究院七O六所 Xen-oriented memory sharing security isolation method for virtual machines

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107111511A (en) * 2016-03-25 2017-08-29 深圳前海达闼云端智能科技有限公司 Access control method, device and system
CN107547258A (en) * 2017-07-18 2018-01-05 新华三云计算技术有限公司 The implementation method and device of a kind of network strategy
CN107547258B (en) * 2017-07-18 2021-02-05 新华三云计算技术有限公司 Method and device for realizing network policy
CN108833332A (en) * 2018-04-11 2018-11-16 广东省卫生厅政务服务中心 Multi-tenant access control method based on hypervisor
CN109902497A (en) * 2019-02-26 2019-06-18 南威软件股份有限公司 A kind of access authority management method and system towards big data cluster

Similar Documents

Publication Publication Date Title
CN109918916B (en) Dual-system trusted computing system and method
JP6772270B2 (en) Dual memory introspection to secure multiple network endpoints
CN102262557B (en) Method for constructing virtual machine monitor by bus architecture and performance service framework
CN103870749B (en) A kind of safety monitoring system and method for realizing dummy machine system
US9971623B2 (en) Isolation method for management virtual machine and apparatus
US8490150B2 (en) System, method, and software for enforcing access control policy rules on utility computing virtualization in cloud computing systems
CN111158906B (en) Active immunity credible cloud system
CN102244684B (en) EFI (Extensible Firmware Interface) trusted Cloud chain guiding method based on USBKey
CN105335212A (en) Method for controlling cloud computing mandatory access based on distributed implementation
CN105956465A (en) VTPM-based method for constructing virtual trusted platform
DE112020000792T5 (en) TRUSTED EXECUTION ENVIRONMENT ACCELERATED BY GRAPHICS PROCESSING UNIT
Afoulki et al. A security-aware scheduler for virtual machines on iaas clouds
EP2862119B1 (en) Network based management of protected data sets
Sammy et al. Energy efficient security preserving vm live migration in data centers for cloud computing
US20190004917A1 (en) Kernel-based power consumption and isolation and defense against emerging power attacks
CN108388793B (en) Virtual machine escape protection method based on active defense
Wenhao et al. Vulnerability analysis and security research of docker container
CN103500304A (en) Virtual machine personalized security monitoring system and method based on Xen
JP2015524128A5 (en)
CN105303102A (en) Secure access method for virtual machine and virtual machine system
CN106445641B (en) Data migration method between secure virtual platforms on discrete computing nodes
CN111143030B (en) Migration method of cloud environment trusted virtual machine
CN110851885B (en) Safety protection architecture system of embedded system
CN102521547B (en) Protecting system for access control system in virtual domain
CN104102524A (en) Method for realizing virtual secure element (VSE)

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160217