首页 | 本学科首页   官方微博 | 高级检索  
     

基于双层信息流控制的云敏感数据安全增强
引用本文:吴泽智,陈性元,杜学绘,杨智.基于双层信息流控制的云敏感数据安全增强[J].电子学报,2018,46(9):2245-2250.
作者姓名:吴泽智  陈性元  杜学绘  杨智
作者单位:1. 信息工程大学密码工程学院, 河南郑州 450001; 2. 密码科学技术国家重点实验室, 北京 100094
摘    要:已有的云安全防护方法如加密、访问控制和虚拟机隔离等不能够提供数据端到端的安全防护。首先,提出了一个面向云环境的双层信息流控制模型,给出了模型的关键要素定义、集中式与分布式信息流控制规则、能力标记调整规则、标记传播规则和降密规则.然后,综合动态污点跟踪和虚拟机自省技术,设计并实现了原型系统IFCloud,可为云租户提供信息流跟踪与控制即服务,为云平台提供常见系统攻击如栈溢出、缓冲区溢出等攻击的防护机制.最后,给出了原型系统IFCloud的功能测试结果.表明IFCloud能够灵活、正确、实时地跟踪和控制云下敏感数据流.可应用于云平台下面向软件即服务的细粒度数据安全保护.

关 键 词:云数据安全  信息流控制模型  动态污点跟踪  虚拟机自省  栈溢出攻击  
收稿时间:2017-08-29

Enhancing Sensitive Data Security Based-on Double-Layer Information Flow Controlling in the Cloud
WU Ze-zhi,CHEN Xing-yuan,DU Xue-hui,YANG Zhi.Enhancing Sensitive Data Security Based-on Double-Layer Information Flow Controlling in the Cloud[J].Acta Electronica Sinica,2018,46(9):2245-2250.
Authors:WU Ze-zhi  CHEN Xing-yuan  DU Xue-hui  YANG Zhi
Affiliation:1. College of Cryptogram Engineering, PLA Information Engineering University, Zhengzhou, Henan 450001, China; 2. State Key Laboratory of Cryptology, Beijing 100094, China
Abstract:The existing security methods in the cloud such as encryption,access control,and VM isolation can not guarantee end-to-end data security.To address this problem,a double-layer information flow control model is proposed.The definition of key element,centralized and decentralized information flow rules,capability adjustment rules,label propagation rules,and declassification rules of the model are presented.Then,taking the advantages of dynamic taint tracking and virtual machine introspection technologies,a prototype system named IFCloud are designed and implemented.IFCloud achieves information flow tracking and controlling as a service for cloud tenant and provides detection methods against common system attacks such as stack and buffer overflow attack for the cloud provider.Finally,IFCloud is demonstrated to be a flexible and accurate system that tracks and controls the sensitive data flow in the cloud at runtime from the function test results,and it can be applied to protect data security at a fine-grained level for the software as a service cloud.
Keywords:cloud data security  information flow control model  dynamic taint tracking  virtual machine introspection  stack overflow attack  
点击此处可从《电子学报》浏览原始摘要信息
点击此处可从《电子学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号