{"title":"云环境下虚拟机镜像安全算法研究","authors":"Preeti Thakur, Devesh Kumar Srivastava","doi":"10.14257/ijsia.2017.11.5.05","DOIUrl":null,"url":null,"abstract":"Virtual Machine is a combined form of operating system and application. Virtualization provides the facility to run multiple operating systems on a single physical machine. These multiple operating systems are called guest operating systems. In server Virtualization many virtual machines (VMs) can run on one server including its own server. These VMs can be migrated from one server to another. As VM image will be downloaded to create a new virtual machine on the guest operating system it has some security problems. Unauthorized access can create the security issues like Malware injection. Due to which there is a need of scheme capable of providing encryption, malware detection, automatic patching to restore the image. In this paper an algorithm is proposed which is capable of providing solution to the above issues.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An Algorithm to Secure Virtual Machine Image in Cloud Environment\",\"authors\":\"Preeti Thakur, Devesh Kumar Srivastava\",\"doi\":\"10.14257/ijsia.2017.11.5.05\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Virtual Machine is a combined form of operating system and application. Virtualization provides the facility to run multiple operating systems on a single physical machine. These multiple operating systems are called guest operating systems. In server Virtualization many virtual machines (VMs) can run on one server including its own server. These VMs can be migrated from one server to another. As VM image will be downloaded to create a new virtual machine on the guest operating system it has some security problems. Unauthorized access can create the security issues like Malware injection. Due to which there is a need of scheme capable of providing encryption, malware detection, automatic patching to restore the image. In this paper an algorithm is proposed which is capable of providing solution to the above issues.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/ijsia.2017.11.5.05\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/ijsia.2017.11.5.05","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Algorithm to Secure Virtual Machine Image in Cloud Environment
Virtual Machine is a combined form of operating system and application. Virtualization provides the facility to run multiple operating systems on a single physical machine. These multiple operating systems are called guest operating systems. In server Virtualization many virtual machines (VMs) can run on one server including its own server. These VMs can be migrated from one server to another. As VM image will be downloaded to create a new virtual machine on the guest operating system it has some security problems. Unauthorized access can create the security issues like Malware injection. Due to which there is a need of scheme capable of providing encryption, malware detection, automatic patching to restore the image. In this paper an algorithm is proposed which is capable of providing solution to the above issues.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security