Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing

被引:2
作者
He, Hui [1 ]
Zhang, Weizhe [1 ]
Liu, Chuanyi [2 ]
Sun, Honglei [3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen Grad Sch, Shenzhen 150001, Guangdong, Peoples R China
[3] Harbin Inst Technol, Network Informat Ctr, Harbin 150001, Heilongjiang, Peoples R China
基金
美国国家科学基金会;
关键词
Autonomic computing; virtual machine introspection; trustworthy; self-sensing; independent decision-making;
D O I
10.1109/TCC.2016.2603508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming to improve Internet content accessing capacity of the system, cloud proxy platforms are used to improve the visiting performance in network export environment. Limited by complexity of cloud proxy system, trustworthy guarantee of cloud system becomes a difficult problem. Considering the self-government of autonomic computing, it could enhance cloud system trustworthy and avoids system management security and reliable problems brought by complex construction. Based on the idea of self-supervisory, a mechanism to enhance security of cloud system was proposed in this paper. First, a trustworthy autonomous enhancement framework for virtual machines was proposed. Second, a method to extract linear relationship of monitoring items in the virtual machine based on ARX model was put forward. According to the mapping relation between monitoring items and system modules, an abnormal module positioning technology based on Naive Bayes classifier was developed to realize self-sensing of abnormal system conditions. Finally, security threats of virtual machines including malicious dialogue and buffer memory of hot attacks were tested through experiments. Results showed that the proposed trustworthy enhancement mechanism of virtual machines based on autonomic computing could achieve trustworthy enhancement of virtual machines effectively and provide an effective safety protection for the cloud system.
引用
收藏
页码:1108 / 1121
页数:14
相关论文
共 26 条
[1]  
[Anonymous], 2001, SYSTEM DEFINITION MO
[2]  
[Anonymous], 2001, HEWLETT PACKARD INFR
[3]   Remote repair of operating system state using backdoors [J].
Bohra, A ;
Neamtiu, I ;
Gallard, P ;
Sultan, F ;
Iftode, L .
INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, :256-263
[4]   Benchmarking autonomic capabilities: promises and pitfalls [J].
Brown, AB ;
Hellerstein, J ;
Hogstrom, M ;
Lau, T ;
Lightstone, S ;
Shum, P ;
Yost, MP .
INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, :266-267
[5]   Failure diagnosis using decision trees [J].
Chen, M ;
Zheng, AX ;
Lloyd, J ;
Jordan, MI ;
Brewer, E .
INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, :36-43
[6]   ANTICHEETAH: Trustworthy computing in an outsourced (cheating) environment [J].
Di Pietro, Roberto ;
Lombardi, Flavio ;
Martinelli, Fabio ;
Sgandurra, Daniele .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 48 :28-38
[7]  
Duda R. O., 1973, PATTERN CLASSIFICATI, V3, P203
[8]   Elastic virtual machine placement in cloud computing network environments [J].
Kavvadia, Eleni ;
Sagiadinos, Spyros ;
Oikonomou, Konstantinos ;
Tsioutsiouliklis, Giorgos ;
Aissa, Sonia .
COMPUTER NETWORKS, 2015, 93 :435-447
[9]   Research challenges of autonomic computing [J].
Kephart, JO .
ICSE 05: 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2005, :15-22
[10]   The vision of autonomic computing [J].
Kephart, JO ;
Chess, DM .
COMPUTER, 2003, 36 (01) :41-+