[1]吴佐平,王海龙,王宏岩,等.通过虚拟机间互相看护减少重复计算的方法[J].计算机技术与发展,2021,31(增刊):62-66.[doi:10. 3969 / j. issn. 1673-629X. 2021. S. 012]
 WU Zuo-ping,WANG Hai-long,WANG Hong-yan,et al.A Method of Reducing Double Counting by Monitoring Each Other Between Virtual Machines[J].,2021,31(增刊):62-66.[doi:10. 3969 / j. issn. 1673-629X. 2021. S. 012]
点击复制

通过虚拟机间互相看护减少重复计算的方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
31
期数:
2021年增刊
页码:
62-66
栏目:
系统工程
出版日期:
2021-12-31

文章信息/Info

Title:
A Method of Reducing Double Counting by Monitoring Each Other Between Virtual Machines
文章编号:
1673-629X(2021)S0062-05
作者:
吴佐平1 王海龙1 王宏岩1 肖 敏1 王 玮2 夏心锋2
1. 北京中电普华信息技术有限公司,北京 100107;
2. 江苏瑞中数据股份有限公司,天津 300300
Author(s):
WU Zuo-ping1 WANG Hai-long1 WANG Hong-yan1 XIAO Min1 WANG Wei2 XIA Xin-feng2
1. Beijing CLP Information Technology Co. ,Ltd. ,Beijing 100107,China;
2. Jiangsu Ruizhong Data Co. ,Ltd. ,Tianjin 300300,China
关键词:
虚拟机数据安全进程看护进程冲突云计算平台
Keywords:
virual machinedata securityprocess monitorprocess conflictopenstack
分类号:
TP31
DOI:
10. 3969 / j. issn. 1673-629X. 2021. S. 012
摘要:
人们的办公环境越来越多地依赖虚拟机、虚拟桌面基础架构( virtual desktop infrastructure,VDI) 等技术,如果将传统的个人计算机( personal computer,PC) 安全软件直接应用于此环境,将造成极大的浪费。 比如,在每台虚拟机上都安装防病毒、防火墙、防泄漏、加密等软件,造成在一个宿主机上,有多个相互隔离的虚拟机,跑着相同的软件,工作的内容也完全一样( 分散方式) 。 文中讨论如何在一台宿主机上只跑一个同类安全软件,就对所有在此设备上创建的虚拟机,提供同样的安全服务( 共享方式) 。 这种方法在不依赖于虚拟化产品供应商提供了虚拟化下层的接口( 底层接口) ,而是靠虚拟机直接共享安全进程、并通过虚拟机之间互相看护的方式实现。 性能接近接底层口方式、但远高于分散方式;投入却远低于底层接口。
Abstract:
The office environment is increasingly dependent on virtual machine,VDI and other technologies. If the traditional PC security software is directly applied to this environment,it will cause a great waste. For example,installing antivirus,firewall,leak prevention,encryption and other software on each virtual machine will result in multiple isolated virtual machines running the same software and doing exactly the same work ( distributed mode) on a single host. We discuss how to provide the same security service ( sharing mode) for allvirtual machines created on a single host with only one of the same security software. This approach does not depend on the virtualization product vendor to provide the interface of the underlying virtualization ( hypersion API) ,but relies on the virtual machines directly share the security process,and through the virtual machine mutual care way to achieve. The performance is close to the API mode,but muchhigher than the distributed mode. The budget is much lower than the API mode.

相似文献/References:

[1]周毅敏 陈榕.Dalvik虚拟机进程模型分析[J].计算机技术与发展,2010,(02):83.
 ZHOU Yi-min,CHEN Rong.Analysis about Process in Dalvik Virtual Machine[J].,2010,(增刊):83.
[2]周平东 陈榕.CAR构件的四种运行时形态[J].计算机技术与发展,2010,(04):1.
 ZHOU Ping-dong,CHEN Rong.Running States of CAR in Elaura[J].,2010,(增刊):1.
[3]包敬海 周小珠 樊东红.基于VMWare构建虚拟网络实验室的研究[J].计算机技术与发展,2010,(06):242.
 BAO Jing-hai,ZHOU Xiao-zhu,FAN Dong-hong.Research of Building Virtual Network Laboratory Based on VMWare[J].,2010,(增刊):242.
[4]曾蜀芳 郭兵 沈艳.μC/OS-Ⅱ中消息队列通信的数据安全问题[J].计算机技术与发展,2009,(08):151.
 ZENG Shu-fang,GUO Bing,SHEN Yan.Data Security of Message Queue Communication in μC/OS-Ⅱ[J].,2009,(增刊):151.
[5]罗恒洋.IPSec在MPLS VPN中的应用[J].计算机技术与发展,2009,(03):168.
 LUO Heng-yang.Application of IPSec in MPLS VPN[J].,2009,(增刊):168.
[6]冯涛 宋成明.清剿Java程序中的内存泄漏[J].计算机技术与发展,2006,(07):123.
 FENG Tao,SONG Cheng-ming.Exterminates Memory Leaks in Java Programs[J].,2006,(增刊):123.
[7]汤亚玲 秦峰 崔志明..NET平台下库存管理系统的设计模式研究[J].计算机技术与发展,2006,(12):133.
 TANG Ya-ling,QIN Feng,CUI Zhi-ming.Research on Design Pattern of Inventory Management Based on. NET Platform[J].,2006,(增刊):133.
[8]周峰.基于虚拟化的办公系统因特网安全访问[J].计算机技术与发展,2010,(10):184.
 ZHOU Feng.High-Security Internet Accessing in OA Based on Virtualization Technology[J].,2010,(增刊):184.
[9]朱团结 艾丽蓉.基于共享内存的Xen虚拟机间通信的研究[J].计算机技术与发展,2011,(07):5.
 ZHU Tuan-jie,AI Li-rong.Research on Xen Inter Domain Communication Based on Shared Memory[J].,2011,(增刊):5.
[10]林龙增 罗省贤.实现多个KVM虚拟机通信的串口转发器方法[J].计算机技术与发展,2012,(02):241.
 LIN Long-zeng,LUO Sheng-xian.A Serial Forwarder Method for Communication of Multiple KVM Virtual Machines[J].,2012,(增刊):241.

更新日期/Last Update: 2021-09-10