The best way to conference proceedings by Francis Academic Press

Web of Proceedings - Francis Academic Press
Web of Proceedings - Francis Academic Press

Data Security Isolation Methods and Practices Based on Different Cloud Environments

Download as PDF

DOI: 10.25236/mmmce.2019.108

Author(s)

Yu Cong, Wang Tingting, Wen Lei, Gao Ruohan, Li Yan

Corresponding Author

Yu Cong

Abstract

Since co-residency virtual machines in a cloud environment share the physical resources, making some malicious users stealthily obtain others' private information through detecting and analyzing the physical resources, which brings the potential threat of the Side-Channel-Attacks and challenged the isolation among co-residency virtual machines in a cloud environment. In view of this, this paper researches the virtual machine security isolation mechanism in cloud environment. In order to build a reliable cloud environment security system and solve the trust and data security problems of cloud environment, a cloud environment isolation mechanism based on trusted computing architecture is proposed and implemented. Combined with the mechanism of cloud environment itself, a research scheme is proposed from the isolation of network architecture. The validity of related models and schemes is verified by experiments and process analysis respectively.

Keywords

Cloud environment, trust, data security