Research on the security of virtual network with Xen platform

被引:1
|
作者
Wu, Hanqian [1 ]
Li, Wei [1 ]
Winer, Chuck [2 ]
Yao, Li [1 ]
机构
[1] School of Computer Science and Engineering, Southeast University, Nanjing, JiangSu, 210096, China
[2] Department of Computer Information Technology and Graphics, Purdue University Calumet, Hammond, IN, United States
关键词
Cloud security - Network security - Virtual reality - Network layers;
D O I
10.3923/itj.2013.7774.7777
中图分类号
学科分类号
摘要
As the next generation of networking computing, cloud computing can offer both software and hardware as on-demand resources and services over the Internet and therefore reduce the capital expenditure and operational expenditure for IT consumers. In order to realize these purposes, however, there are still some challenges to be solved. With no doubts, security is the most concerned issue. This is why security must be integrated into every aspect of cloud computing. Virtualization is the key technology to build a cloud computing platform, as a result, virtualization security is one of the significant concerns in cloud computing. In this paper, we focus on the security of virtual network in virtualized environment. First, we research Xen platform which is the most popular hypervisor used in the industry and then the security problems that exist in a virtual network are discussed and analysed based on Xen platform. Finally this paper presents a multi-layer virtual network framework aimed to control the inter-communication among virtual machines deployed in physical machines with higher security. © 2013 Asian Network for Scientific Information.
引用
收藏
页码:7774 / 7777
相关论文
共 50 条
  • [41] The Research of Network Teaching Platform
    Zhang, Huiying
    ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT III, 2011, 216 : 267 - 272
  • [42] VNSP: A Virtual Network Based Simulation Platform
    Li, Dawei
    Mao, Shaojie
    Zhu, Lixin
    ASIASIM 2012, PT I, 2012, 323 : 182 - 189
  • [43] The Research of Network Security Technologies
    Wang, Zhen
    Liu, Zhijie
    Xie, Xiaoyao
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 585 - 587
  • [44] Research on Computer Network Security
    Yin, Qinghai
    3RD INTERNATIONAL SYMPOSIUM ON MECHATRONICS AND INDUSTRIAL INFORMATICS, (ISMII 2017), 2017, : 235 - 240
  • [45] Research on Security of VoIP Network
    Liu, Xiaojun
    Tu, Chunxia
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 59 - 65
  • [46] Research on the Network Technology Security
    Rong, Wang
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMPUTER AND SOCIETY, 2016, 37 : 1739 - 1741
  • [47] The Research of Network Security Solutions
    Tian, Jin
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 922 - 925
  • [48] An idle virtual CPU scheduling algorithm on Xen virtual machines
    Wang, K. (Joy_tom_79@163.com), 1600, Science Press (50):
  • [49] Second Life: A Virtual World Platform for Profiling Online Behavior for Network and Information Security Education? An Initial Investigation
    Grimes, Galen
    Bartolacci, Michael
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2010, 2 (04) : 60 - 64
  • [50] Network para virtualization by Xen
    Qin, Gaode
    EEA - Electrotehnica, Electronica, Automatica, 2014, 62 (02): : 106 - 111