Data Security Isolation Methods and Practices Based on Different Cloud Environments
Download as PDF
DOI: 10.25236/mmmce.2019.108
Author(s)
Yu Cong, Wang Tingting, Wen Lei, Gao Ruohan, Li Yan
Corresponding Author
Yu Cong
Abstract
Since co-residency virtual machines in a cloud environment share the physical resources, making some malicious users stealthily obtain others' private information through detecting and analyzing the physical resources, which brings the potential threat of the Side-Channel-Attacks and challenged the isolation among co-residency virtual machines in a cloud environment. In view of this, this paper researches the virtual machine security isolation mechanism in cloud environment. In order to build a reliable cloud environment security system and solve the trust and data security problems of cloud environment, a cloud environment isolation mechanism based on trusted computing architecture is proposed and implemented. Combined with the mechanism of cloud environment itself, a research scheme is proposed from the isolation of network architecture. The validity of related models and schemes is verified by experiments and process analysis respectively.
Keywords
Cloud environment, trust, data security