首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
云计算虚拟化安全技术研究   总被引:2,自引:2,他引:2  
近年来,伴随云计算服务的发展和普及,其安全问题也逐渐凸显.而其中的虚拟化安全则是云服务商和安全厂商关注的重点.梳理了云计算虚拟化环境中主要面临的安全威胁,提出了云计算虚拟化安全技术架构,包含基于KVM的虚拟化安全技术框架和虚拟化集中管控平台两个部分,并依照技术架构开发了“沃云”安全管理平台原型系统,对云计算虚拟化安全技术架构进行了理论验证.  相似文献   

2.
    
Resource virtualization has become one of the key super‐power mobile computing architecture technologies. As mobile devices and multimedia traffic have increased dramatically, the load on mobile cloud computing systems has become heavier. Under such conditions, mobile cloud system reliability becomes a challenging task. In this paper, we propose a new model using a naive Bayes classifier for hypervisor failure prediction and prevention in mobile cloud computing. We exploit real‐time monitoring data in combination with historical maintenance data, which achieves higher accuracy in failure prediction and early failure‐risk detection. After detecting hypervisors at risk, we perform live migration of virtual servers within a cluster, which decreases the load and prevents failures in the cloud. We performed a simulation for verification. According to the experimental results, our proposed model shows good accuracy in failure prediction and the possibility of decreasing downtime in a hypervisor service. Copyright © 2017 John Wiley & Sons, Ltd.  相似文献   

3.
云计算的安全问题探讨   总被引:4,自引:2,他引:4  
随着信息技术的发展,云计算逐渐从理论状态走进了人们的现实生活,它为信息管理、资源分配甚至终端用户操作模式带来巨大变革的同时,其安全问题也不容忽视。对云计算可能引入的安全问题进行了初步的探讨,并强调云服务提供商虽然通过云计算给大家提供了方便易用的服务,但在终端用户访问控制与系统可持续性等传统安全防护方面不仅没有提供有效的解决方案,还引入了用户隐私防护、网络犯罪与计算机取证和溯源问题等新的安全问题。  相似文献   

4.
服务器虚拟化关键技术探析   总被引:1,自引:0,他引:1  
唐彦  肖亮 《数字通信》2012,39(3):11-14
服务器虚拟化是云计算基础平台的核心部分,具有降低运营成本、应用平坦化、实时迁移提高服务可用性、整合资源和绿色等多重价值优势。服务器虚拟化技术涉及CPU虚拟化、内存虚拟化设备、I/O和网口虚拟化等3个硬件虚拟关键技术和实时迁移技术1个辅助功能关键技术。通过对服务器虚拟化关键技术的解析,展示了云计算的基础IT资源的构成。同时,根据服务器虚拟性能的特点,为运营云计算的服务提供商提供了选取虚拟服务器的标准。  相似文献   

5.
对于云计算数据中心而言,网络作为云计算基础架构和服务提供的重要组成部分,需要满足更高的要求。本文首先给出网络的重要性,之后从数据中心网络、跨数据中心网络二个层面分别分析了最新的技术进展和技术需求。  相似文献   

6.
一种通信距离最小化的虚拟机分配算法   总被引:1,自引:0,他引:1  
为了解决云资源分配过程中虚拟机通信距离较大,造成用户计算任务完成时间延长问题,提出一种最短通信距离的虚拟机分配算法.云资源管理器能够根据用户指定的虚拟机条件,将计算任务分割到合适的数据中心及其内部服务器,大大缩短了虚拟机之间的通信距离.仿真实验表明,与现有的贪婪算法和随机方法相比,提出的方法通信量更少,执行速度更快.  相似文献   

7.
Cloud computing is becoming a hot topic of the information industry in recent years. Many companies provide the cloud services, such as Google Apps and Apple multimedia services. In general, by applying the virtualization technologies, the data center is built for cloud computing to provide users with the computing and storage resources, as well as the software environment. Thus, the quality of service (QoS) must be considered to satisfy users’ requirements. This paper proposes a high efficiency scheduling scheme for supporting cloud computing. The virtual machine migration technique has been applied to the proposed scheduling scheme for improving the resources utilization and satisfying the QoS requirement of users. The experimental results show that in addition to satisfying the QoS requirement of users, the proposed scheme can improve the resources utilization effectively.  相似文献   

8.
Cloud computing is the latest major evolution in computing technology.The convergence between cloud computing and telecom networks could significantly reduce costs and bring new business opportunities for operators.Currently,traditional telecom operators are embarrassed by the fact that the increase in revenue cannot catch up with the quick growth of users and the expansion of networks.With the introduction of the cloud computing technology,operators can virtualize the network functions through low-cost COTS IT hardware.All kinds of existing services can be cloudified and thus obtain the benefits of statistical multiplexing among IT resources.With the Telco Cloud architecture,operators can manage both IT infrastructures and network resources intelligently in order to adapt to the dynamic demands from the application and to establish open platforms for developing new services.  相似文献   

9.
虚拟化技术由于其在效率、成本、扩展性等方面的诸多优势,近年来在云计算领域得到了广泛的应用。但虚拟化在安全方面带来了一些负面的影响,包括:虚拟化增加了技术层,必须有附加的安全控制,从而增加了安全管理负担;虚拟化环境动态性很强,使得创建和维护必要的安全边界变得更加复杂;在出现安全漏洞时,许多虚拟系统集中到单一的物理计算机上的架构可能造成较大的影响等。从技术、管理和运维的角度,对虚拟化安全进行了论述。  相似文献   

10.
云计算中服务器虚拟化技术探讨   总被引:1,自引:0,他引:1  
探讨了服务器虚拟化对云计算的意义,服务器虚拟化的技术特点、功能要素、虚拟化技术选择需要考虑的因素及优缺点。  相似文献   

11.
    
Cloud computing is becoming a hot topic of the information industry in recent years. Many companies provide the cloud services, such as Google Apps and Apple multimedia services. In general, by applying the virtualization technologies, the data center is built for cloud computing to provide users with the computing and storage resources, as well as the software environment. Thus, the quality of service (QoS) must be considered to satisfy users' requirements. This paper proposes a high efficiency scheduling scheme for supporting cloud computing. The virtual machine migration technique has been applied to the proposed scheduling scheme for improving the resources utilization and satisfying the QoS requirement of users. The experimental results show that in addition to satisfying the QoS requirement of users, the proposed scheme can improve the resources utilization effectively.  相似文献   

12.
云计算为信息系统未来的发展方向,而技术的发展却面临着许多的困难。随着云计算的不断普及和应用,安全问题的重要性正呈现逐步上升的趋势,并且成为制约云计算技术发展的关键因素。云计算的核心技术在于虚拟化,而虚拟化存在诸如安全隔离、受控迁移、权限访问等系列安全问题,已经实实在在摆在人们面前。文中着重分析目前虚拟化技术存在的安全问题,并提出了与之匹配的解决思路。  相似文献   

13.
夏虞斌  杨春  程旭 《电子学报》2011,39(8):1721-1726
桌面虚拟化通常运行混合负载,且更注重交互式性能,现有的虚拟机调度算法无法很好适应这两个特点.本文提出了一种全时抢占CPU调度算法,通过灰盒技术探测虚拟机内部信息用于辅助虚拟机调度,并结合远程桌面的负载特性进行优化.评测表明,5台WindowsXP虚拟机同时运行混合负载,优化后播放幻灯片的显示延迟降低了至少60%.  相似文献   

14.
云计算关键技术分析研究   总被引:3,自引:3,他引:3  
李瑛  胡新炜 《现代电子技术》2012,35(14):65-67,72
针对云计算概念的多种技术组合特征,对其框架模型进行分析,研究面向服务的体系架构(SOA)的主要功能,服务抽象是面向服务模式中的主要设计原则;研究平台虚拟化、网络虚拟化、数据库虚拟化的不同特征和作用,强调数据中心虚拟化是所有虚拟化技术的整合;研究Web关键技术在云计算中的作用特征。明确了结论,即云计算中面向服务的体系架构使网络应用可以满足按需获取,虚拟化使应用与底层的基础设施相互分离,Web技术使云计算中信息内容的合作成为可能,在线社区交互简单易行。  相似文献   

15.
简介网络虚拟化技术,提出了网络虚拟化技术在高可用性网络及分组传送网中的应用场景,针对目前虚拟化技术存在的关键问题,给出运营商应用网络虚拟化技术方面的建议。  相似文献   

16.
    
Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed.  相似文献   

17.
    
In recent years, the increasing use of cloud services has led to the growth and importance of developing cloud data centers. One of the challenging issues in the cloud environments is high energy consumption in data centers, which has been ignored in the corporate competition for developing cloud data centers. The most important problems of using large cloud data centers are high energy costs and greenhouse gas emission. So, researchers are now struggling to find an effective approach to decreasing energy consumption in cloud data centers. One of the preferred techniques for reducing energy consumption is the virtual machines (VMs) placement. In this paper, we present a VM allocation algorithm to reduce energy consumption and Service Level Agreement Violation (SLAV). The proposed algorithm is based on best‐fit decreasing algorithm, which uses learning automata theory, correlation coefficient, and ensemble prediction algorithm to make better decisions in VM allocation. The experimental results indicated improvement regarding energy consumption and SLAV, compared with well‐familiar baseline VM allocation algorithms.  相似文献   

18.
    
With an explosive increase of data produced annually, researchers have been attempting to develop solutions for systems that can effectively handle large amounts of data. Single-operating-system (OS) non-uniform memory access (NUMA) abstraction technology is an important technology that ensures the compatibility of single-node programming interfaces across multiple nodes owing to its higher cost efficiency compared with scale-up systems. However, existing technologies have not been successful in optimizing user performance. In this paper, we introduce a single-OS NUMA abstraction technology that ensures full compatibility with the existing OS while improving the performance at both hypervisor and guest levels. Benchmark results show that the proposed technique can improve performance by up to 4.74× on average in terms of execution time compared with the existing state-of-the-art open-source technology.  相似文献   

19.
传统的云计算与虚拟化平台实质上仅实现了服务器的虚拟化,介绍了一种新型的将计算和存储进行聚合、基于软件定义存储架构的Nutanix虚拟平台.以山东大众网构建云媒资系统为例,介绍了Nutanix平台工作原理,包括节点架构、NDFS文件系统的数据读写机制、压缩技术和平台的容错与可靠性,并讨论了媒资系统在此平台上的部署与优化等相关工作.  相似文献   

20.
虚拟化:技术、应用与挑战   总被引:1,自引:0,他引:1  
葛勤革 《通信技术》2011,(10):91-93,96
在当前"应用为王"的时代,虚拟化技术已经在服务器和桌面计算机中得到广泛应用,是挖掘计算机潜力和优化的主要途径,其发展趋势已经不可逆转。随着虚拟化技术的不断应用,传统的通信网络和信息安全技术势必将受到影响。面对这样的形势,首先对虚拟化的定义和技术概念进行辨析,进而介绍了虚拟化在传统计算、通信网络和信息安全领域的各种应用,最后分析了其对通信网络安全、接入和管理方面的挑战,指出了其将给通信网络和信息安全带来不小的发展机遇。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号