TY - JOUR
T1 - 面向云平台非可信Hypervisor 的保护机制综述
AU - Gu, Jianan
AU - Zheng, Beilei
AU - Weng, Chuliang
N1 - Publisher Copyright:
© 2020 Journal of Computer Engineering and Applications Beijing Co., Ltd.; Science Press. All rights reserved.
PY - 2020/2
Y1 - 2020/2
N2 - In this big data era, the multi-tenant cloud platform plays an important role. However, as one of the major technologies adopted in the cloud platforms, the virtualization technology is not secure enough. The Hypervisor is a key layer in the virtualization software stack that manages vital tasks between guest virtual machines and the bare metal, such as resource allocation, sharing and isolation. Meanwhile, the Hypervisor suffers from vulnerabilities along with its large attack surface, which makes attacks on the Hypervisor threaten the cloud and applications above. Therefore, constructing protection mechanisms for the untrusted Hypervisor in the cloud is necessary. Survey from the perspective of the protection mechanism's construction: analyze the feasibility and challenges, and do classifications; present the related work in this field in terms of integrity detection mechanisms, defense mechanisms, and isolation mechanisms; give research trends and provide a valuable reference for future researchs on the vir-tualization security and on building a reliable multi-tenant cloud platform.
AB - In this big data era, the multi-tenant cloud platform plays an important role. However, as one of the major technologies adopted in the cloud platforms, the virtualization technology is not secure enough. The Hypervisor is a key layer in the virtualization software stack that manages vital tasks between guest virtual machines and the bare metal, such as resource allocation, sharing and isolation. Meanwhile, the Hypervisor suffers from vulnerabilities along with its large attack surface, which makes attacks on the Hypervisor threaten the cloud and applications above. Therefore, constructing protection mechanisms for the untrusted Hypervisor in the cloud is necessary. Survey from the perspective of the protection mechanism's construction: analyze the feasibility and challenges, and do classifications; present the related work in this field in terms of integrity detection mechanisms, defense mechanisms, and isolation mechanisms; give research trends and provide a valuable reference for future researchs on the vir-tualization security and on building a reliable multi-tenant cloud platform.
KW - cloud platform
KW - construction of protection mechanism
KW - untrusted Hypervisor
KW - virtualization security
UR - https://www.scopus.com/pages/publications/85186467356
U2 - 10.3778/j.issn.1673-9418.1909071
DO - 10.3778/j.issn.1673-9418.1909071
M3 - 文章
AN - SCOPUS:85186467356
SN - 1673-9418
VL - 14
SP - 200
EP - 214
JO - Journal of Frontiers of Computer Science and Technology
JF - Journal of Frontiers of Computer Science and Technology
IS - 2
ER -