Deqing Zou
Huazhong University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Deqing Zou.
The Journal of Supercomputing | 2013
Hai Jin; Guofu Xiang; Deqing Zou; Song Wu; Feng Zhao; Min Li; Weide Zheng
With the development of information technology, cloud computing becomes a new direction of grid computing. Cloud computing is user-centric, and provides end users with leasing service. Guaranteeing the security of user data needs careful consideration before cloud computing is widely applied in business. Virtualization provides a new approach to solve the traditional security problems and can be taken as the underlying infrastructure of cloud computing. In this paper, we propose an intrusion prevention system, VMFence, in a virtualization-based cloud computing environment, which is used to monitor network flow and file integrity in real time, and provide a network defense and file integrity protection as well. Due to the dynamicity of the virtual machine, the detection process varies with the state of the virtual machine. The state transition of the virtual machine is described via Definite Finite Automata (DFA). We have implemented VMFence on an open-source virtual machine monitor platform—Xen. The experimental results show our proposed method is effective and it brings acceptable overhead.
International Journal of Grid and Utility Computing | 2005
Hai Jin; Xuanhua Shi; Weizhong Qiang; Deqing Zou
In data-intensive applications, such as high-energy physics, bio-informatics, we encounter applications involving numerous jobs that access and generate large datasets. Effective scheduling of such applications is a challenge, due to the need to consider for both computational resources and data storage resources. In this paper, we describe an adaptive scheduling model that considers availability of computational, storage and network resources. Based on this model we implement a scheduler used in our campus grid. The results achieved by our scheduler have been analysed by comparing with greedy algorithm that is widely used in computational grids and some data grids.
grid computing | 2003
Hai Jin; Deqing Zou; Hanhua Chen; Jianhua Sun; Song Wu
Grid computing emerges as effective technologies to couple geographically distributed resources and solve large-scale computational problems in wide area networks. The fault tolerance is a significant and complex issue in grid computing systems. Various techniques have been investigated to detect and correct faults in distributed computing systems. Unreliable fault detection is one of the most effective techniques. Globus as a grid middleware manages resources in a wide area network. The Globus fault detection service uses the well-known techniques based on unreliable fault detectors to detect and report component failures. However, more powerful techniques are required to detect and correct both system-level and application-level faults in a grid system, and a convenient toolkit is also needed to maintain the consistency in the grid. A fault-tolerant grid platform (FTGP) based on an unreliable fault detector and the Globus fault detection service is presented in this paper. The platform offers effective strategies in such three aspects as grid key components, user tasks, and high-level applications.
symposium on reliable distributed systems | 2010
Guofu Xiang; Hai Jin; Deqing Zou; Xinwen Zhang; Sha Wen; Feng Zhao
Monitoring virtual machine (VM) is an essential function for virtualized platforms. Existing solutions are either coarse-grained – monitoring in granularity of VM level, or not general – only support specific monitoring functions for particular guest operating system (OS). Thus they do not satisfy the monitoring requirement in large-scale server cluster such as data center and public cloud platform, where each physical platform runs hundreds of VMs with different guest OSes. In this paper, we propose VMDriver, a general and fine-grained approach for virtualization monitoring. The novel design of VMDriver is the separation of event interception point in VMM level and rich guest OS semantic reconstructions in management domain. With this design, variant monitoring drivers in management domain can mask the differences of guest OSes. We implement VMDriver on Xen and our experimental study shows that it introduces very small performance overhead. We demonstrate its generality by inspecting four aspects information about the target virtual machines with different guest OSes. The unified interface of VMDriver brings convenience to develop complex monitoring tools for distributed virtualization environment.
international conference on e-business engineering | 2007
Zhensong Liao; Hai Jin; Deqing Zou
Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and access control policies specifying what credentials a stranger must submit in the open and distributed environment. While ATN brings convenience, there are still two issues unsolved successfully: 1) to protect the transmitting message; 2) to prevent the sensitive information leakage. Hidden credential can provide high security level to protect sensitive resources, policies and credentials from being attacked. Zero-knowledge is an important means to avoid leakage and can be used to protect the users private context and sensitive information from unauthorized inferences. If hidden credentials and zero-knowledge are well-combined and redesigned, they can jointly make ATN better. Based on these, a hidden credential based oblivious automated trust negotiation model (HBOA) is proposed in this paper. In the model, the negotiation information is carried by hidden credentials, which have the same secure level with elliptic curve. Zero-knowledge protocol is provided by Pedersen commitment scheme, which ensures that no sensitive information can be attained by authorized users. A practical example is given to prove its usability.
International Journal of Grid and Utility Computing | 2005
Hai Jin; Weizhong Qiang; Xuanhua Shi; Deqing Zou
Grid computing is emerging as a new format of wide area distributed computing. Because the distribution of services and resources in wide-area networks are heterogeneous, dynamic, and multi-domain, security is a critical concern in grid computing. Authorisation and access control, which are important aspects of security, have obtained more and more attention. This paper proposes a universal, scalable authorisation and access control architecture, RB-GACA, for grid computing. It is based on classical access control mechanism in distributed applications, Role Based Access Control (RBAC). The paper provides a flexible policy management approach for various grid environments. We also use a standard policy language for the presentation of access control policies to provide a general and standard support for different services and resources.
international conference on cloud and green computing | 2012
Ali A. Yassin; Hai Jin; Ayad Ibrahim; Deqing Zou
Cloud security represents a main hindrance that causes to retard its widespread adoption. Authentication considers a significance element of security in cloud environment, aiming to verify a users identity when a user wishes to request services from cloud. There are many authentication schemes that depend on username/password, but they are considered weak techniques of cloud authentication. A more secure scheme is the two-factor authentication that does not only verify the username/password pair, but also needs a second factor such as a token device, biometric. However, the feasibility of second-factor authentication is limited by the deployment complexity, high cost and the cloud security is compromised when the token is missing or purloined. Furthermore, these schemes are failed to resist well-known attacks such as replay attacks, reflection attacks. This paper proposes two-factor authentication scheme based on Schnorr digital signature and feature extraction from fingerprint to overcome above aforementioned issues. Security analysis and experimental results illustrate that our proposed scheme can withstand the common security attacks as well, and has a good performance of password authentication.
international conference on cluster computing | 2010
Gang Chen; Hai Jin; Deqing Zou; Bing Bing Zhou; Weizhong Qiang; Gang Hu
When multiple instances of an application running on multiple virtual machines, an interesting problem is how to utilize the fault handling result from one application instance to heal the same fault occurred on other sibling instances, and hence to ensure high service availability in a cloud computing environment. This paper presents SHelp, a lightweight runtime system that can survive software failures in the framework of virtual machines. It applies weighted rescue points and error virtualization techniques to effectively make applications by-pass the faulty path. A two-level storage hierarchy is adopted in the rescue point database for applications running on different virtual machines to share error handling information to reduce the redundancy and to more effectively and quickly recover from future faults caused by the same bugs. A Linux prototype is implemented and evaluated using four web server applications that contain various types of bugs. Our experimental results show that SHelp can make server applications to recover from these bugs in just a few seconds with modest performance overhead.
IEEE Transactions on Dependable and Secure Computing | 2013
Gang Chen; Hai Jin; Deqing Zou; Bing Bing Zhou; Zhenkai Liang; Weide Zheng; Xuanhua Shi
Buffer overflow attacks still pose a significant threat to the security and availability of todays computer systems. Although there are a number of solutions proposed to provide adequate protection against buffer overflow attacks, most of existing solutions terminate the vulnerable program when the buffer overflow occurs, effectively rendering the program unavailable. The impact on availability is a serious problem on service-oriented platforms. This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities. The key technique of our solution is to virtualize memory accesses and move the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without stopping normal system execution. We developed a prototype on a Linux system, and conducted extensive experiments to evaluate the effectiveness and performance of the system using a range of applications. Our experimental results showed that SafeStack can quickly generate runtime patches to successfully handle the attacks recurrence. Furthermore, SafeStack only incurs acceptable overhead for the patched applications.
grid and cooperative computing | 2003
Xuanhua Shi; Hai Jin; Weizhong Qiang; Deqing Zou
In data-intensive applications, such as high-energy physics, bio-informatics, we encounter applications involving numerous jobs that access and generate large datasets. Effective scheduling such applications is challenging, due to a need to consider for both computational resources and data storage resources. In this paper, we describe an adaptive scheduling model that consider availability of computational, storage and network resources. Based on this model we implement a scheduler used in our campus grid. The results achieved by our scheduler have been analyzed by comparing Greedy algorithm that is widely used in computational grids and some data grids.