云計算服務平臺安全審計技術研究與實現(xiàn)
本文關鍵詞: 云平臺 安全審計 代理 關聯(lián)分析 出處:《北京郵電大學》2014年碩士論文 論文類型:學位論文
【摘要】:近年來隨著網(wǎng)絡規(guī)模的不斷擴大,人們更加傾向?qū)⒕W(wǎng)絡作為日常業(yè)務的處理的途徑,網(wǎng)絡為用戶進行信息的交流與存儲提供了平臺。云計算技術在這種用戶需求不斷增大的背景下應運而生,各大廠商相繼推出基于云計算技術的服務平臺,依靠其通用性與低使用成本而得到了廣泛的使用。然而,云平臺的安全性問題也逐漸暴露出來,對云計算服務提供商來說,用戶在使用服務的過程中是否有異常行為,對異常行為的審計是保證服務正常運行的重要環(huán)節(jié)。 本文首先對云平臺安全審計相關的技術進行了全面的深入的研究,包括學習傳統(tǒng)安全審計的標準和模型與云平臺審計相關的技術;分析傳統(tǒng)安全審計的不足、云環(huán)境安全與傳統(tǒng)網(wǎng)絡安全的區(qū)別,為審計系統(tǒng)設計與實現(xiàn)建立了理論依據(jù)。提出一種面向云計算服務平臺的安全審計模型。該模型具有以下特點: (1)基于云平臺Agent的審計信息收集。在審計信息收集階段,通過部署在集群服務器上的云平臺Agent,進行云環(huán)境下審計信息的采集和格式化,再將格式化數(shù)據(jù)發(fā)送給存儲服務器,同時進行實時審計。通過應用分布式部署的云平臺Agent,提高審計信息收集的能力; (2)采用基于對稱密鑰加密的審計信息存儲。在審計信息存儲的過程中,通過對敏感的審計信息進行加密及安全的密鑰存儲管理體系,并支持使用對稱密鑰加密后信息的密文檢索,防止云服務商內(nèi)部竊取和篡改數(shù)據(jù),保證了半可信的云環(huán)境中審計信息的機密性; (3)實時與事后相結(jié)合的審計信息分析。云平臺Agent根據(jù)下發(fā)至本地規(guī)則庫中的規(guī)則進行初步的實時審計,審計分析模塊根據(jù)規(guī)則庫進行事后審計。通過兩種審計相結(jié)合的方式,保證審計分析的有效性。 同時,本文對云平臺事后審計分析使用的Apriori算法的連接步進行了改進,減少了無效的連接和比較次數(shù),減輕了系統(tǒng)I/0的負荷,提高了算法的效率。 在云計算服務平臺安全審計模型的基礎上實現(xiàn)的“北京工業(yè)云計算平臺保障項目”,包括對審計信息收集、審計信息安全存儲、審計信息分析等主要系統(tǒng)功能的實現(xiàn),對使用系統(tǒng)的用戶提供友好的操作界面,具有較高的易用性。經(jīng)過測試,系統(tǒng)滿足云平臺審計的要求。
[Abstract]:In recent years, with the continuous expansion of the scale of the network, people are more inclined to take the network as a way to deal with daily business. The network provides a platform for users to exchange and store information. Cloud computing technology emerges as the times require in the background of increasing user demand, each major manufacturer has launched a service platform based on cloud computing technology. Because of its versatility and low cost of use, it has been widely used. However, the security problems of cloud platform have been gradually exposed. For cloud computing service providers, whether the user has abnormal behavior in the process of using the service, The audit of abnormal behavior is an important link to ensure the normal operation of service. Firstly, this paper makes a comprehensive and in-depth study on the technologies related to the security audit of cloud platform, including learning the standard and model of traditional security audit and the technology related to the audit of cloud platform, analyzing the shortcomings of the traditional security audit, The difference between cloud environment security and traditional network security establishes the theoretical basis for the design and implementation of audit system. A security audit model for cloud computing service platform is proposed. The model has the following characteristics:. Audit information collection based on cloud platform Agent. In the stage of audit information collection, through the cloud platform agent deployed on the cluster server, the audit information is collected and formatted in the cloud environment, and then the formatted data is sent to the storage server. At the same time, real-time audit. Through the application of distributed deployment of cloud platform agent, improve the ability of audit information collection; Audit information storage based on symmetric key encryption is adopted. In the process of audit information storage, the sensitive audit information is encrypted and a secure key storage management system is adopted. It also supports the ciphertext retrieval of information encrypted by symmetric key to prevent the cloud service providers from stealing and tampering with the data, which ensures the confidentiality of audit information in the semi-trusted cloud environment. The cloud platform Agent carries on the preliminary real-time audit according to the rule sent to the local rule base, the audit analysis module carries on the post audit according to the rule base. Through the two kinds of audit combination way, the cloud platform Agent carries on the preliminary real-time audit according to the rule base. Ensure the effectiveness of audit analysis. At the same time, this paper improves the join step of the Apriori algorithm used in the post-audit analysis of cloud platform, reduces the invalid connection and comparison times, lightens the load of the system I / 0 and improves the efficiency of the algorithm. Based on the security audit model of cloud computing service platform, the "Beijing Industrial Cloud Computing platform guarantee Project" includes the realization of the main system functions, such as audit information collection, audit information security storage, audit information analysis and so on. The system provides a friendly interface for the users of the system, and it is easy to use. After testing, the system meets the requirements of cloud platform audit.
【學位授予單位】:北京郵電大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.09
【參考文獻】
相關期刊論文 前10條
1 石彪,胡華平,劉利枚;網(wǎng)絡環(huán)境下的日志監(jiān)控與安全審計系統(tǒng)設計與實現(xiàn)[J];福建電腦;2004年12期
2 許霆,袁萌,史美林;網(wǎng)絡監(jiān)控審計系統(tǒng)的設計與實現(xiàn)[J];計算機工程與應用;2002年18期
3 楊向榮,宋擒豹,沈鈞毅;基于數(shù)據(jù)挖掘的智能化入侵檢測系統(tǒng)[J];計算機工程;2001年09期
4 徐菁,劉寶旭,許榕生;基于數(shù)據(jù)挖掘技術的入侵檢測系統(tǒng)設計與實現(xiàn)[J];計算機工程;2002年06期
5 張建勛;古志民;鄭超;;云計算研究進展綜述[J];計算機應用研究;2010年02期
6 王偉釗,李承,李家濱;網(wǎng)絡安全審計系統(tǒng)的實現(xiàn)方法[J];計算機應用與軟件;2002年11期
7 陳世強;蔡超;;審計系統(tǒng)中基于數(shù)據(jù)挖掘的關聯(lián)規(guī)則自動發(fā)現(xiàn)技術研究[J];計算機應用與軟件;2007年01期
8 田秀霞;王曉玲;高明;周傲英;;數(shù)據(jù)庫服務——安全與隱私保護[J];軟件學報;2010年05期
9 鮑偉民;;基于云計算的安全審計系統(tǒng)研究與設計[J];軟件產(chǎn)業(yè)與工程;2012年06期
10 王強;皮德常;李偉奇;呂軍;;基于Agent和數(shù)據(jù)挖掘的分布式信息審計平臺[J];計算機技術與發(fā)展;2006年04期
,本文編號:1541752
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/1541752.html