Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing

被引:2
作者
He, Hui [1 ]
Zhang, Weizhe [1 ]
Liu, Chuanyi [2 ]
Sun, Honglei [3 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Heilongjiang, Peoples R China
[2] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen Grad Sch, Shenzhen 150001, Guangdong, Peoples R China
[3] Harbin Inst Technol, Network Informat Ctr, Harbin 150001, Heilongjiang, Peoples R China
基金
美国国家科学基金会;
关键词
Autonomic computing; virtual machine introspection; trustworthy; self-sensing; independent decision-making;
D O I
10.1109/TCC.2016.2603508
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Aiming to improve Internet content accessing capacity of the system, cloud proxy platforms are used to improve the visiting performance in network export environment. Limited by complexity of cloud proxy system, trustworthy guarantee of cloud system becomes a difficult problem. Considering the self-government of autonomic computing, it could enhance cloud system trustworthy and avoids system management security and reliable problems brought by complex construction. Based on the idea of self-supervisory, a mechanism to enhance security of cloud system was proposed in this paper. First, a trustworthy autonomous enhancement framework for virtual machines was proposed. Second, a method to extract linear relationship of monitoring items in the virtual machine based on ARX model was put forward. According to the mapping relation between monitoring items and system modules, an abnormal module positioning technology based on Naive Bayes classifier was developed to realize self-sensing of abnormal system conditions. Finally, security threats of virtual machines including malicious dialogue and buffer memory of hot attacks were tested through experiments. Results showed that the proposed trustworthy enhancement mechanism of virtual machines based on autonomic computing could achieve trustworthy enhancement of virtual machines effectively and provide an effective safety protection for the cloud system.
引用
收藏
页码:1108 / 1121
页数:14
相关论文
共 26 条
[11]   Discovering correctness constraints for self-management of system configuration [J].
Kiciman, E ;
Wang, YM .
INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, :28-35
[12]   Reinforcement learning for autonomic network repair [J].
Littman, ML ;
Ravi, N ;
Fenson, E ;
Howard, R .
INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2004, :284-285
[13]  
Ljung L., 1987, SYSTEM IDENTIFICATIO, P8
[14]  
Menasce D. A., 2006, AUTONOMIC COMPUTING, P353
[15]   A trustworthy, fault-tolerant and scalable self-configuration algorithm for Organic Computing systems [J].
Msadek, Nizar ;
Kiefhaber, Rolf ;
Ungerer, Theo .
JOURNAL OF SYSTEMS ARCHITECTURE, 2015, 61 (10) :511-519
[16]  
Mulle H. A., 2006, CMUSEI2006TN006
[17]  
Olson MA, 1999, PROCEEDINGS OF THE FREENIX TRACK, P183
[18]  
Parashar M., 2006, AUTONOMIC COMPUTING, P3
[19]  
Rutherford M. J., 2002, P IFIP ACM WORK C CO, P47
[20]  
Srivastava B, 2005, ICAC 2005: SECOND INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, P331