为了提高机载嵌入式系统软件开发效率,快速生成软件原型,同时提升机载嵌入式系统软件的可移植性,研究了基于Wind River Hypervisor的机载嵌入式系统虚拟化技术,对Wind River Hypervisor架构进行了剖析,阐述了hyperkernel的内部结构,指明...为了提高机载嵌入式系统软件开发效率,快速生成软件原型,同时提升机载嵌入式系统软件的可移植性,研究了基于Wind River Hypervisor的机载嵌入式系统虚拟化技术,对Wind River Hypervisor架构进行了剖析,阐述了hyperkernel的内部结构,指明了Wind River Hypervisor中不同类型线程在系统运行过程中所承担的角色以及运行特点,并基于Wind River Hypervisor实现了多种虚拟化架构,通过对不同架构的对比展示了每种架构的特征,同时借助workbench+vxworks653环境证实了在机载嵌入式系统部署Wind River Hypervisor架构的可行性。展开更多
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati...The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.展开更多
Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are...Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture.展开更多
As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy i...As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.展开更多
Two key issues exist during virtual machine (VM) migration in cloud computing. One is when to start migration, and the other is how to determine a reliable target, both of which totally depend on whether the source ...Two key issues exist during virtual machine (VM) migration in cloud computing. One is when to start migration, and the other is how to determine a reliable target, both of which totally depend on whether the source hypervisor is trusted or not in previous studies. However, once the source hypervisor is not trusted any more, migration will be facing unprecedented challenges. To address the problems, we propose a secure architecture SMIG (secure migration), which defines a new concept of Region Critical TCB and leverages an innovative adjacent integrity measurement (AIM) mechanism. AIM dynamically monitors the integrity of its adjacent hypervisor, and passes the results to the Re- gion Critical TCB, which then determines whether to start migration and where to migrate according to a table named integrity validation table. We have implemented a prototype of SMIG based on the Xen hypervisor. Experimental evaluation result shows that SMIG could detect a malicious hypervisor and start migration to a trusted one rapidly, only incurring a moderate overhead for computing intensive and I/O intensive tasks, and small for others.展开更多
The development of the Next-Generation Wireless Network(NGWN)is becoming a reality.To conduct specialized processes more,rapid network deployment has become essential.Methodologies like Network Function Virtualization...The development of the Next-Generation Wireless Network(NGWN)is becoming a reality.To conduct specialized processes more,rapid network deployment has become essential.Methodologies like Network Function Virtualization(NFV),Software-Defined Networks(SDN),and cloud computing will be crucial in addressing various challenges that 5G networks will face,particularly adaptability,scalability,and reliability.The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms,including hypervisors,clouds,and containers,which will serve as a guide to dealing with the stimulating environment of 5G.This is particularly crucial when implementing network operations at the edge of 5G networks,where limited resources and prompt user responses are mandatory.Experimental results prove that containers outperform hypervisor-based virtualized infrastructure and cloud platforms’latency and network throughput at the expense of higher virtualized processor use.In contrast to public clouds,where a set of rules is created to allow only the appropriate traffic,security is still a problem with containers.展开更多
文摘为了提高机载嵌入式系统软件开发效率,快速生成软件原型,同时提升机载嵌入式系统软件的可移植性,研究了基于Wind River Hypervisor的机载嵌入式系统虚拟化技术,对Wind River Hypervisor架构进行了剖析,阐述了hyperkernel的内部结构,指明了Wind River Hypervisor中不同类型线程在系统运行过程中所承担的角色以及运行特点,并基于Wind River Hypervisor实现了多种虚拟化架构,通过对不同架构的对比展示了每种架构的特征,同时借助workbench+vxworks653环境证实了在机载嵌入式系统部署Wind River Hypervisor架构的可行性。
文摘The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment.
文摘Virtualization technology plays a key role in cloud computing.Thus,the security issues of virtualization tools(hypervisors,emulators,etc.) should be under precise consideration.However,threats of insider attacks are underestimated.The virtualization tools and hypervisors have been poorly protected from this type of attacks.Furthermore,hypervisor is one of the most critical elements in cloud computing infrastructure.Firstly,hypervisor vulnerabilities analysis is provided.Secondly,a formal model of insider attack on hypervisor is developed.Consequently,on the basis of the formal attack model,we propose a new methodology of hypervisor stability evaluation.In this paper,certain security countermeasures are considered that should be integrated in hypervisor software architecture.
文摘As the extensive use of cloud computing raises questions about the security of any personal data stored there,cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment.A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware.The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment.An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance;Each hypervisor should be examined to meet specific needs.The main objective of this study is to provide accurate results to compare the performance of Hyper-V and Kernel-based Virtual Machine(KVM)while implementing different cryptographic algorithms to guide cloud service providers and end users in choosing the most suitable hypervisor for their cryptographic needs.This study evaluated the efficiency of two hypervisors,Hyper-V and KVM,in implementing six cryptographic algorithms:Rivest,Shamir,Adleman(RSA),Advanced Encryption Standard(AES),Triple Data Encryption Standard(TripleDES),Carlisle Adams and Stafford Tavares(CAST-128),BLOWFISH,and TwoFish.The study’s findings show that KVM outperforms Hyper-V,with 12.2%less Central Processing Unit(CPU)use and 12.95%less time overall for encryption and decryption operations with various file sizes.The study’s findings emphasize how crucial it is to pick a hypervisor that is appropriate for cryptographic needs in a cloud environment,which could assist both cloud service providers and end users.Future research may focus more on how various hypervisors perform while handling cryptographic workloads.
基金Acknowledgements The subject was sponsored by the National Science and Technology Major Project (2012ZX01039-004) and the National Natural Science Foundation of China (Grant No. 61305054)
文摘Two key issues exist during virtual machine (VM) migration in cloud computing. One is when to start migration, and the other is how to determine a reliable target, both of which totally depend on whether the source hypervisor is trusted or not in previous studies. However, once the source hypervisor is not trusted any more, migration will be facing unprecedented challenges. To address the problems, we propose a secure architecture SMIG (secure migration), which defines a new concept of Region Critical TCB and leverages an innovative adjacent integrity measurement (AIM) mechanism. AIM dynamically monitors the integrity of its adjacent hypervisor, and passes the results to the Re- gion Critical TCB, which then determines whether to start migration and where to migrate according to a table named integrity validation table. We have implemented a prototype of SMIG based on the Xen hypervisor. Experimental evaluation result shows that SMIG could detect a malicious hypervisor and start migration to a trusted one rapidly, only incurring a moderate overhead for computing intensive and I/O intensive tasks, and small for others.
基金supported by Future University Researchers Supporting Project Number FUESP-2020/48 at Future University in Egypt,New Cairo 11845,Egypt.
文摘The development of the Next-Generation Wireless Network(NGWN)is becoming a reality.To conduct specialized processes more,rapid network deployment has become essential.Methodologies like Network Function Virtualization(NFV),Software-Defined Networks(SDN),and cloud computing will be crucial in addressing various challenges that 5G networks will face,particularly adaptability,scalability,and reliability.The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms,including hypervisors,clouds,and containers,which will serve as a guide to dealing with the stimulating environment of 5G.This is particularly crucial when implementing network operations at the edge of 5G networks,where limited resources and prompt user responses are mandatory.Experimental results prove that containers outperform hypervisor-based virtualized infrastructure and cloud platforms’latency and network throughput at the expense of higher virtualized processor use.In contrast to public clouds,where a set of rules is created to allow only the appropriate traffic,security is still a problem with containers.