A Testing Method of the Residual Information Clearance in Virtual Machine for the Cloud Operating System

Author(s):  
Yan Chen ◽  
Jing Lai ◽  
Xiang Wei
2021 ◽  
Vol 37 (1--4) ◽  
pp. 1-27
Author(s):  
Yiming Zhang ◽  
Chengfei Zhang ◽  
Yaozheng Wang ◽  
Kai Yu ◽  
Guangtao Xue ◽  
...  

Unikernel specializes a minimalistic LibOS and a target application into a standalone single-purpose virtual machine (VM) running on a hypervisor, which is referred to as (virtual) appliance . Compared to traditional VMs, Unikernel appliances have smaller memory footprint and lower overhead while guaranteeing the same level of isolation. On the downside, Unikernel strips off the process abstraction from its monolithic appliance and thus sacrifices flexibility, efficiency, and applicability. In this article, we examine whether there is a balance embracing the best of both Unikernel appliances (strong isolation) and processes (high flexibility/efficiency). We present KylinX, a dynamic library operating system for simplified and efficient cloud virtualization by providing the pVM (process-like VM) abstraction. A pVM takes the hypervisor as an OS and the Unikernel appliance as a process allowing both page-level and library-level dynamic mapping. At the page level, KylinX supports pVM fork plus a set of API for inter-pVM communication (IpC, which is compatible with conventional UNIX IPC). At the library level, KylinX supports shared libraries to be linked to a Unikernel appliance at runtime. KylinX enforces mapping restrictions against potential threats. We implement a prototype of KylinX by modifying MiniOS and Xen tools. Extensive experimental results show that KylinX achieves similar performance both in micro benchmarks (fork, IpC, library update, etc.) and in applications (Redis, web server, and DNS server) compared to conventional processes, while retaining the strong isolation benefit of VMs/Unikernels.


2014 ◽  
Vol 530-531 ◽  
pp. 667-670
Author(s):  
Ke Ming Chen

In order to ensure that the cloud platform client runtime kernel virtual machine security, this paper proposes a new framework for dynamic monitoring of virtual machines, it is for the kernel rootkit attacks, study the cloud client virtual machine operating system kernel safety, presented Hyperchk virtual machine dynamic monitoring framework. This framework mainly for kernel rootkit attacks, ensure that customers running virtual machine kernel security.


2013 ◽  
Vol 394 ◽  
pp. 495-498
Author(s):  
Ya Jun Wang

Operating Linux Application softwares on Windows platform, can not only promote the development of interoperability technology of these two operating systems, but also strengthen the status Windows has in the market. Because of the differences in the architectures of Linux and Windows, when running Linux application programs in Windows operating system, we need to resort to some certain kinds of technologies such as Services For Unix, Application Programming Interface emulation, virtual machine platform, source codes refactoring, etc. This paper aims at making deep analyses on the principles and features of these technologies.


2018 ◽  
Vol 5 (1) ◽  
pp. 1-8
Author(s):  
Milton Campoverde Molina ◽  
Jenny Vizñay Durán ◽  
Silvia Vintimilla Jara

Este artículo revela el análisis comparativo de los esquemas de metadatos MARC21, MODS, DUBLIN CORE y OPAC en la catalogación y publicación de tesis y proyectos de investigación en el repositorio DSpace. Inicia con la elaboración y aplicación de una encuesta a los administradores bibliotecarios de las instituciones: Universidad de Cuenca, Universidad del Azuay, Universidad Católica de Cuenca, Universidad Politécnica Salesiana y la Biblioteca Municipal de la ciudad de Cuenca, con el fin de determinar el esquema de metadatos empleado en la catalogación de tesis y proyectos de investigación. Luego se realiza la instalación de una Máquina Virtual bajo el sistema operativo Ubuntu, utilizando la herramienta tasksel se instalan los requisitos previos a la instalación de DSpace, configuración del repositorio DSpace y publicación de los contenidos de tesis y proyectos de investigación dentro del repositorio. Se concluye que el metadato que predomina dentro de los repositorios DSpace es el Dublin Core y es el que mejor se adecua para la catalogación de tesis y proyectos de investigación, en las pruebas con estudiantes y profesores en los tres aspectos: técnico, de uso y funcional. El esquema de metadato Dublin Core en el repositorio DSpace es calificado como excelente, presentando un nivel medio de complejidad en el registro de documentos. ABSTRACT This article reveals the comparative analysis of metadata schemas MARC21, MODS, DUBLIN CORE and OPAC in cataloging and publication of thesis and research projects in the DSpace repository. It begins with the development and implementation of a survey to library administrators of the following institutions: University of Cuenca, Azuay University, Catholic University of Cuenca, Salesian University and the Municipal Library of the city of Cuenca, in order to determine the schema metadata used in cataloging thesis and research projects. Then a virtual Machine was installed under the Ubuntu operating system. By using the tasksel tool the prerequisites are installed previous to the installation of DSpace, DSpace repository configuration and publication of the contents of thesis and research projects within the repository. It is concluded that the metadata that prevails within the DSpace repositories is the Dublin Core and it is the one best fits for cataloging thesis and research projects, in tests with students and teachers in the three aspects: technical, use and functional. The Dublin Core metadata schema in the repository DSpace is rated as excellent, having an average level of complexity in registration documents.


2021 ◽  
Vol 2138 (1) ◽  
pp. 012018
Author(s):  
Huimin Zhao

Abstract Linux operating system provides a good platform for the research on computer science due to its characteristics of open source, stability and efficiency. The teaching platform based on Linux has many advantages over that of Windows operating system. To promote the application of Linux and develop domestic software with independent intellectual property rights, the author studies and analyzes the feasibility of Linux teaching platform which can adapt to the current cross platform teaching of information technology in Colleges and universities and meet the requirements of computer grade examination. The author proposes to build an information technology teaching platform based on Linux operating system, and realize the cross platform of mainstream application software through Wine, and meanwhile use virtual machine to support Windows operating system environment. The author puts forward suggestions and measures in the application process, and verifies the feasibility of platform implementation, and proposes the preliminary scheme of platform construction.


2018 ◽  
Vol 1 (2) ◽  
pp. 118-124
Author(s):  
Arif Hidayat ◽  
Ismail Puji Saputra

Information and communication technology is something that is difficult to separate from human life in the present era. One example of information and communication technology is a network of proxy routers. This study uses the penetration testing method, which aims to analyze the security system of the proxy router that has been applied to Warnet Aulia.net. In analyzing network security, the Mikrotik Router is done by the method of penetration testing where the form of attacks on the network is simulated. In this study Python and Winboxpoc.py were successfully run on the Windows 10 operating system. The results of this study indicate that the network security owned by the Aulia.net cafe network still has many gaps to exploit. As for the results of some attacks, it shows serious things in terms of exploitation, such as the output of getting a proxy router password and username. Therefore, this study also provides a solution on how to prevent the mikrotik router from being exploited. Problem solving is explained using several alternative solutions, so that practitioners or network technicians are expected to be able to utilize knowledge related to the results of this study in order to secure the router.


Sign in / Sign up

Export Citation Format

Share Document