CN105007261A - Security protection method for image file in virtual environment - Google Patents

Security protection method for image file in virtual environment Download PDF

Info

Publication number
CN105007261A
CN105007261A CN201510295527.6A CN201510295527A CN105007261A CN 105007261 A CN105007261 A CN 105007261A CN 201510295527 A CN201510295527 A CN 201510295527A CN 105007261 A CN105007261 A CN 105007261A
Authority
CN
China
Prior art keywords
image file
virtual machine
mark
file
illegal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510295527.6A
Other languages
Chinese (zh)
Inventor
付才
张嘉夫
韩兰胜
刘铭
崔永泉
汤学明
骆婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201510295527.6A priority Critical patent/CN105007261A/en
Publication of CN105007261A publication Critical patent/CN105007261A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/131Protocols for games, networked simulations or virtual reality

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention discloses a security protection method for an image file in a virtual environment, concretely comprising the following steps: obtaining information of an image file of a virtual machine; generating a unique identifier corresponding to the image file; verifying the identifier and judging whether the image is legal when the virtual machine is started, normally starting the virtual machine when the verification is passed, and otherwise, judging the image file of the virtual machine to be an illegal image and disenabling starting of the virtual machine by destroying the structure of the image file through a certain method. It is important to note that the behavior for destroying the image file is reversible, i.e., the destroyed image file can be recovered. The security protection method of the present invention ensures security of the loaded image file during starting of the virtual machine every time, and effectively performs security protection for the image file by utilizing the uniqueness of the generated identifier and a series of measures such as destroying the illegal image file, thereby improving security of the whole system.

Description

The safety protecting method of image file under a kind of virtualized environment
Technical field
The invention belongs to field of cloud calculation, more specifically, relate to the safety protecting method of image file under a kind of virtualized environment.
Background technology
Cloud computing represents a kind of new business computation schema, its practical application in every respect also has a lot of uncertain place, is faced with a lot of security challenges.Wherein, especially outstanding for the problem of secure user data in cloud platform, be mainly manifested in following aspect: the virtual machine of the multiple tissue of virtualized efficiency requirements coexists in Same Physical resource in cloud.Although the safety of traditional data center stands good in cloud environment, physical isolation and hardware based safety can not protect the attack prevented on same server between virtual machine.Management access is by the Internet, instead of adhere in conventional data centers pattern in check and restriction directly or to on-the-spot connection.Which increase the risk of local virtual machine mirror image and disk file and expose chance, monitor closely is carried out in the change needed Systematical control and access control restriction.
Summary of the invention
For the defect that data security under current cloud environment exists; the object of the present invention is to provide the safety protecting method of image file under a kind of virtualized environment; be intended to the protection strengthening secure user data on current basal; also safety inspection is made to occur when user starts virtual machine at every turn; improve the mandatory and accuracy of verification; stop it to start for unsafe virtual machine very first time simultaneously, thus improve the safe class of the entirety of system.
For achieving the above object, the invention provides the safety protecting method of image file under a kind of virtualized environment, comprise the following steps:
(1) obtain the essential information of the image file needing protection, comprise filename, file type, file size and file creation time;
(2) extract the non-legible information in the essential information of described image file, and these information are formed final effective information according to preset order combination, generate unique identification corresponding to this image file according to effective information;
(3), after obtaining the correspondence mark of image file, the image file binding that identify corresponding to it is carried out;
(4) when virtual machine activation load images file, the mark corresponding to this image file carries out validity checking to this image file, if this image file binding logo and identify legal, normal load image file also starts virtual machine; Otherwise think that this virtual machine is illegal, lock this virtual machine image file and stop it to start.
In one embodiment of the present of invention, in described step (2), the generating mode of mark is secret, and the mark generated is unique.
In one embodiment of the present of invention, the generation method of described mark is: use public signature algorithm, or designed, designed algorithm.
In one embodiment of the present of invention, in described step (3), the image file binding that identify corresponding to it specifically comprises: corresponding to image file and its mark is bound by usage data storehouse technology, maybe by any position of mark write image file.
In one embodiment of the present of invention, described any position by mark write image file specifically comprises: mark is write image file end, or being stored in image file of hash.
In one embodiment of the present of invention, carry out validity checking to this image file in described step (4) specifically to comprise: whether verification image file has bound corresponding mark, and generated the correspondence mark of this image file by the method in step (2), verify newly-generated this correspondence identify whether identify with corresponding in image file consistent legal.
In one embodiment of the present of invention, described method also comprises:
(5) when judging that this virtual machine is illegal, the startup of illegal virtual machine is stoped by the method destroying image file structure.
In one embodiment of the present of invention, the method for described destruction image file structure is specially: the file header rewriteeing image file.
In one embodiment of the present of invention, the destruction of described image file is reversible, and namely keeper can to the XOR rewriting again of 128 bytes before image file head, can recover disrupted virtual machine image file, makes it can normal load again.
By the above technical scheme that the present invention conceives, compared with prior art, the present invention has following beneficial effect:
(1) mark generating method owing to using in step (3) has flexible and changeable characteristic, and keeper to its regular update, to eliminate out-of-date algorithm, can use signature algorithm more safely and efficiently.
(2) checking procedure owing to using in step (4) realizes by revising virtualization system source code and recompilating to install, therefore the process verified is compulsory, not can bypass, verify and all can be performed before each unlatching virtual machine, namely open virtual machine at every turn and all can check its legitimacy.
(3) mode that user cannot be identified by direct copying passes through verification, reason is as follows: the mark of image file generates according to the attribute information of respective file, they have the feature of uniqueness, and these file attributes are including, but not limited to filename, file size, creation-time etc.Therefore the mark generated has the feature of uniqueness equally.
(4) can perform immediately when verifying unsuccessfully for the destruction of illegal image file in step (5), therefore will come into force during this startup virtual machine, namely failure is started, and this step stops it to load by destroying file structure, user cannot recover voluntarily, recovery routine except by correspondence could unlock image file, makes it can normal load.
Accompanying drawing explanation
Fig. 1 is the flow chart of image file means of defence under virtualized environment in the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
As shown in Figure 1, in the present invention, under virtualized environment, the safety protecting method of image file comprises the following steps:
(1) obtain the essential information of the image file needing protection, include but not limited to filename, file type, file size and file creation time etc.These information can be unique this image file of representative, as next step generate image file mark foundation.
(2) the non-legible information in the essential information of the image file obtained before extraction, and these information are formed final effective information according to preset order combination, generate unique identification corresponding to this image file according to effective information.
Wherein, the generating mode of mark is secret, does not also limit to: can use disclosed signature algorithm, also can designed, designed algorithm realization, only need guarantee that the mark generated has uniqueness and irreversible feature.
(3), after obtaining the correspondence mark of image file, the image file binding that identify corresponding to it is carried out.
Wherein, mark is various with the binding mode of image file, includes but are not limited to: following method: corresponding with it for image file mark is bound by usage data storehouse technology, maybe by any position of mark write image file, as image file end, or hash to be stored in image file medium.
(4) work as virtual machine activation, during load images file, the mark corresponding to this image file carries out validity checking to this image file, if this image file binding logo and identify legal, normal load image file also starts virtual machine; Otherwise think that this virtual machine is illegal, lock this virtual machine image file and stop it to start.
Particularly, can, by the method for amendment virtualization system source code, be the functional module of virtualization system interpolation verification image file mark.
The process wherein verified is compulsory, not can bypass, and verifies and all can be performed before each unlatching virtual machine, namely opens virtual machine at every turn and all can check its legitimacy.The major function of this module is whether verification image file has bound corresponding mark, and by generating the process of image file mark before simulation, whether unanimously legally verifies concrete image file mark.
(5) method by destroying image file structure stops the startup of illegal virtual machine, namely the file header of image file is rewritten, 128 byte XORs before top of file are rewritten, just can not correct file reading header during such load images file, thus stop this virtual machine activation.
It is to be noted that be reversible to the destruction of image file, namely keeper to the XOR rewriting again of 128 bytes before image file head, so just can recover disrupted virtual machine image file, makes it can normal load again.
In addition to the illegal image file verified unsuccessfully, should destroy its file structure immediately, namely lock this image file, make it normally not start, after unlocking except by extra recovery routine, this image file ability normal load also starts virtual machine.
Those skilled in the art will readily understand; the foregoing is only preferred embodiment of the present invention; not in order to limit the present invention, all any amendments done within the spirit and principles in the present invention, equivalent replacement and improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an image file safety protecting method under virtualized environment, comprises the following steps:
(1) obtain the essential information of the image file needing protection, comprise filename, file type, file size and file creation time;
(2) extract the non-legible information in the essential information of described image file, and these information are formed final effective information according to preset order combination, generate unique identification corresponding to this image file according to effective information;
(3), after obtaining the correspondence mark of image file, the image file binding that identify corresponding to it is carried out;
(4) when virtual machine activation load images file, the mark corresponding to this image file carries out validity checking to this image file, if this image file binding logo and identify legal, normal load image file also starts virtual machine; Otherwise think that this virtual machine is illegal, lock this virtual machine image file and stop it to start.
2. method according to claim 1, is characterized in that, in described step (2), the generating mode of mark is secret, and the mark generated is unique.
3. method according to claim 2, is characterized in that, the generation method of described mark is: use public signature algorithm, or designed, designed algorithm.
4. method according to claim 1 and 2, it is characterized in that, in described step (3), the image file binding that identify corresponding to it specifically comprises: corresponding to image file and its mark is bound by usage data storehouse technology, maybe by any position of mark write image file.
5. method according to claim 4, is characterized in that, described any position by mark write image file specifically comprises: mark is write image file end, or being stored in image file of hash.
6. method according to claim 1 and 2, it is characterized in that, carry out validity checking to this image file in described step (4) specifically to comprise: whether verification image file has bound corresponding mark, and generated the correspondence mark of this image file by the method in step (2), verify newly-generated this correspondence identify whether identify with corresponding in image file consistent legal.
7. method according to claim 1 and 2, is characterized in that, described method also comprises:
(5) when judging that this virtual machine is illegal, the startup of illegal virtual machine is stoped by the method destroying image file structure.
8. method according to claim 7, is characterized in that, the method for described destruction image file structure is specially: the file header rewriteeing image file.
9. method according to claim 8, it is characterized in that, the destruction of described image file is reversible, and namely keeper can to the XOR rewriting again of 128 bytes before image file head, disrupted virtual machine image file can be recovered, make it can normal load again.
10. method according to claim 7, it is characterized in that, to the illegal image file verified unsuccessfully, destroy its file structure immediately, namely this image file is locked, make it normally not start, after unlocking except by extra recovery routine, this image file ability normal load also starts virtual machine.
CN201510295527.6A 2015-06-02 2015-06-02 Security protection method for image file in virtual environment Pending CN105007261A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510295527.6A CN105007261A (en) 2015-06-02 2015-06-02 Security protection method for image file in virtual environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510295527.6A CN105007261A (en) 2015-06-02 2015-06-02 Security protection method for image file in virtual environment

Publications (1)

Publication Number Publication Date
CN105007261A true CN105007261A (en) 2015-10-28

Family

ID=54379784

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510295527.6A Pending CN105007261A (en) 2015-06-02 2015-06-02 Security protection method for image file in virtual environment

Country Status (1)

Country Link
CN (1) CN105007261A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911744A (en) * 2015-12-23 2017-06-30 北京神州泰岳软件股份有限公司 The management method and managing device of a kind of image file
CN107704731A (en) * 2017-09-28 2018-02-16 成都安恒信息技术有限公司 A kind of cloud platform mirror image method for preventing piracy based on HOTP
CN109154903A (en) * 2016-05-02 2019-01-04 微软技术许可有限责任公司 Recovery environment for virtual machine
CN110489209A (en) * 2019-07-24 2019-11-22 联想(北京)有限公司 A kind of information processing method and equipment
CN111125725A (en) * 2019-11-22 2020-05-08 苏州浪潮智能科技有限公司 Encryption and decryption method, equipment and medium for mirror image verification
CN112235427A (en) * 2020-12-14 2021-01-15 广东睿江云计算股份有限公司 Merging method and system for mirror image files

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101465770A (en) * 2009-01-06 2009-06-24 北京航空航天大学 Method for disposing inbreak detection system
US20100299315A1 (en) * 2005-08-09 2010-11-25 Nexsan Technologies Canada Inc. Data archiving system
CN101976317A (en) * 2010-11-05 2011-02-16 北京世纪互联工程技术服务有限公司 Virtual machine image safety method in private cloud computing application
CN102214118A (en) * 2010-04-08 2011-10-12 中国移动通信集团公司 Method, system and device for controlling virtual machine (VM)
CN102419803A (en) * 2011-11-01 2012-04-18 成都市华为赛门铁克科技有限公司 Method, system and device for searching and killing computer virus
CN102917046A (en) * 2012-10-17 2013-02-06 广州杰赛科技股份有限公司 Virtual machine starting control method in cloud system
CN103064706A (en) * 2012-12-20 2013-04-24 曙光云计算技术有限公司 Starting method and device for virtual machine system
CN103092650A (en) * 2013-01-09 2013-05-08 华中科技大学 Virtual machine mirror image generating method and device based on software preinstallation in cloud environment
CN103457974A (en) * 2012-06-01 2013-12-18 中兴通讯股份有限公司 Safety control method and device for virtual machine mirror images
CN103906068A (en) * 2012-12-26 2014-07-02 华为技术有限公司 Virtual base station establishment method and device
CN104463012A (en) * 2014-11-24 2015-03-25 东软集团股份有限公司 Virtual machine image file exporting and importing method and device

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100299315A1 (en) * 2005-08-09 2010-11-25 Nexsan Technologies Canada Inc. Data archiving system
CN101465770A (en) * 2009-01-06 2009-06-24 北京航空航天大学 Method for disposing inbreak detection system
CN102214118A (en) * 2010-04-08 2011-10-12 中国移动通信集团公司 Method, system and device for controlling virtual machine (VM)
CN101976317A (en) * 2010-11-05 2011-02-16 北京世纪互联工程技术服务有限公司 Virtual machine image safety method in private cloud computing application
CN102419803A (en) * 2011-11-01 2012-04-18 成都市华为赛门铁克科技有限公司 Method, system and device for searching and killing computer virus
CN103457974A (en) * 2012-06-01 2013-12-18 中兴通讯股份有限公司 Safety control method and device for virtual machine mirror images
CN102917046A (en) * 2012-10-17 2013-02-06 广州杰赛科技股份有限公司 Virtual machine starting control method in cloud system
CN103064706A (en) * 2012-12-20 2013-04-24 曙光云计算技术有限公司 Starting method and device for virtual machine system
CN103906068A (en) * 2012-12-26 2014-07-02 华为技术有限公司 Virtual base station establishment method and device
CN103092650A (en) * 2013-01-09 2013-05-08 华中科技大学 Virtual machine mirror image generating method and device based on software preinstallation in cloud environment
CN104463012A (en) * 2014-11-24 2015-03-25 东软集团股份有限公司 Virtual machine image file exporting and importing method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911744A (en) * 2015-12-23 2017-06-30 北京神州泰岳软件股份有限公司 The management method and managing device of a kind of image file
CN106911744B (en) * 2015-12-23 2019-11-08 北京神州泰岳软件股份有限公司 A kind of management method and managing device of image file
CN109154903A (en) * 2016-05-02 2019-01-04 微软技术许可有限责任公司 Recovery environment for virtual machine
CN109154903B (en) * 2016-05-02 2022-09-23 微软技术许可有限责任公司 Recovery environment for virtual machines
CN107704731A (en) * 2017-09-28 2018-02-16 成都安恒信息技术有限公司 A kind of cloud platform mirror image method for preventing piracy based on HOTP
CN107704731B (en) * 2017-09-28 2021-03-09 成都安恒信息技术有限公司 Cloud platform mirror image anti-piracy method based on HOTP
CN110489209A (en) * 2019-07-24 2019-11-22 联想(北京)有限公司 A kind of information processing method and equipment
CN111125725A (en) * 2019-11-22 2020-05-08 苏州浪潮智能科技有限公司 Encryption and decryption method, equipment and medium for mirror image verification
CN112235427A (en) * 2020-12-14 2021-01-15 广东睿江云计算股份有限公司 Merging method and system for mirror image files

Similar Documents

Publication Publication Date Title
TWI782970B (en) Computer-implemented methods for securing blockchain transaction based on undetermined data, electronic device, and a computer readable storage
CN105007261A (en) Security protection method for image file in virtual environment
US11223484B1 (en) Enhanced authentication method for Hadoop job containers
US11074139B2 (en) Dynamic block chain system using metadata for backing up data based on digest rules
CN102208000B (en) Method and system for providing security mechanisms for virtual machine images
US7853780B2 (en) Core initialization code validation
US9276752B2 (en) System and method for secure software update
JP5703391B2 (en) System and method for tamper resistant boot processing
CN104572168B (en) System and method is protected in a kind of BIOS self refreshes
TW202036347A (en) Method and apparatus for data storage and verification
CN101436141A (en) Firmware upgrading and encapsulating method and device based on digital signing
CN103530548B (en) Startup method that built-in terminal based on mobile trustable computation module is credible
US20100313011A1 (en) Identity Data Management in a High Availability Network
CN104573490A (en) Method for protecting installed software on Android platform
CN101983375A (en) Binding a cryptographic module to a platform
KR20200071682A (en) Self-encryption drive (sed)
CN105308610A (en) Method and system for platform and user application security on a device
CN112817621A (en) BIOS firmware refreshing method and device and related components
KR20170089352A (en) Firmware integrity verification for performing the virtualization system
CN107247643A (en) A kind of data base management method, device, system, storage medium and equipment
CN104361298B (en) The method and apparatus of Information Security
KR20100106110A (en) Secure boot data total management system, methods for generating and verifying a verity of matadata for managing secure boot data, computer-readable recording medium storing program for executing any of such methods
WO2016024967A1 (en) Secure non-volatile random access memory
CN102833296A (en) Method and equipment for constructing safe computing environment
CN112733126B (en) Product license authentication method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20151028

RJ01 Rejection of invention patent application after publication