SELinux-Based Secure Server Virtualization

Article Preview

Abstract:

Server virtualization is to create and run several independent operation systems at the same time to maximize the utilization efficiency and flexibility of IT resource, the most serious security problem of which, however, is the unauthorized access of unsafe virtual machines. This paper presents a SELinux-based secure server virtualization method against the issue. With SELinux access control, virtual machine process is isolated from system processes by setting up different type labels and access control policies. Whats more, different virtual machine processes can be independent with each other by introducing Multi Category Security (MCS) protection mechanism, thus to achieve secure access of server virtualization. Finally the realization of the method is presented.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

2829-2833

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sehgal N K, Ganguli M. Applications of virtualization for server management and security. Proceedings of IEEE International Conference on Industrial Technology. Mumbai, India, 2006: 2752-2755.

DOI: 10.1109/icit.2006.372614

Google Scholar

[2] Jing Fang, Hao Wu, Songlin Bai. Virtualization Security Issues of Cloud Computing. Telecommunications Science, 2012, 2(04): 135-140.

Google Scholar

[3] Mayer, Frank, Karl. SELinux by Example. USA: Addison-Wesley, 2005: 157-198.

Google Scholar

[4] Wenjie Tu, Haibing Guan, Caiying Bai. Access Control Features of Enhanced Linux File System. Computer Applications And Software, 2006, 23(2): 117-119.

Google Scholar

[5] Zhe Ma, Xi Yu, Ao Yuan, Xiaolei Yi, Qingwen Shen. Analysis of Xen Security Mechanism. Information Network Security, 2011, 10(11): 31-35.

Google Scholar

[6] Hua Jiang. Research of Role-based Access Control Technology in SELinux[D]. Wuhan: Huazhong University of Science and Technology, (2009).

Google Scholar

[7] Jie Zeng. Research of Linux-based Least Privilege Management Mechanism and Automation of Security Test. Beijing: Beijing Jiaotong University, (2006).

Google Scholar

[8] Yang Zhang. Analysis Method of SELinux Security Policy Information Flow with Sensitive Label. Chinese Journal of Computers, 2009, 4(4): 709-720.

Google Scholar