{"title":"Design and implement a safe method for isolating memory based on Xen cloud environment","authors":"Y. Liu","doi":"10.1109/ICSESS.2016.7883189","DOIUrl":null,"url":null,"abstract":"In view of the present cloud security problem which has been becoming one of the major obstacles hindering the development of the cloud increasingly, put forward a kind of technology implementation of memory security isolation based on Xen. And based on the Xen virtual machine monitor system, analysis the implementation approach of memory virtualization in the model, using Xen virtualization system memory's super calls and authorization table mechanism, design the security memory isolation system with the basics of virtual machine manager internal implementation of access control module (ACM). Experiments show that the system can effectively isolate the memory data between different customer domain OS illegal access.","PeriodicalId":175933,"journal":{"name":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 7th IEEE International Conference on Software Engineering and Service Science (ICSESS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSESS.2016.7883189","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In view of the present cloud security problem which has been becoming one of the major obstacles hindering the development of the cloud increasingly, put forward a kind of technology implementation of memory security isolation based on Xen. And based on the Xen virtual machine monitor system, analysis the implementation approach of memory virtualization in the model, using Xen virtualization system memory's super calls and authorization table mechanism, design the security memory isolation system with the basics of virtual machine manager internal implementation of access control module (ACM). Experiments show that the system can effectively isolate the memory data between different customer domain OS illegal access.