contentsamazonec2

amazonec2  时间:2021-03-26  阅读:()
Chapter18DIGITALWATERMARKINGOFVIRTUALMACHINEIMAGESKumikoTadano,MasahiroKawato,RyoFurukawa,FumioMachidaandYoshiharuMaenoAbstractThewidespreaduseofserveranddesktopvirtualizationtechnologiesincreasesthelikelihoodofunauthorizedanduncontrolleddistributionofvirtualmachine(VM)imagesthatcontainproprietarysoftware.
Thispaperattemptstoaddressthisissueusingaplatform-independentdig-italwatermarkingschemeapplicabletoavarietyofVMimages.
TheschemeembedsawatermarkintheformoflesinaVMimage;thewatermarkedVMimageisidentiedbasedontheembeddedles.
Toreducethepossibilityofdiscoverybyanattacker,thenamesoftheem-beddedlesareverysimilartothenamesofpre-existinglesintheVMimage.
Experimentsindicatethattheapproachisfastandaccu-rate,withaverageturnaroundtimesof24.
001secondsand7.
549secondsforwatermarkgenerationanddetection,respectively.
Keywords:Digitalwatermarking,virtualmachineimages1.
IntroductionInmodernenterprisecomputingthereisagrowingtrendtowardcon-solidatingvirtualmachines(VMs)intheserverandclientsidestoreducecostsandenhanceportabilityandsecurity.
SuchenvironmentsrequirethemeanstoexportVMimagestotestsoftwareandtobackupVMs.
Forexample,Amazon'sElasticComputeCloud[1]andSimpleStorageService[2]providethecommandec2-download-bundletodownloadVMimagesfromadatacentertolocalcomputers[3].
Unfortunately,thistechnologyalsofacilitatestheunauthorizeddisseminationofVMimagescontainingproprietarysoftware.
Oneapproachforaddressingthisissueistousehost-basedintru-siondetectionsystemssuchasTripWire,AIDEandXenFIT[8].
TheseK.
-P.
Chow,S.
Shenoi(Eds.
):AdvancesinDigitalForensicsVI,IFIPAICT337,pp.
257–268,2010.
cIFIPInternationalFederationforInformationProcessing2010258ADVANCESINDIGITALFORENSICSVIsystemsmonitorunauthorizedlesystemchangestodetectmaliciousactivityinvolvingVMs.
However,itisdiculttoidentifyVMimagesaftertheyhavebeendistributedoutsideofanenterprisenetwork(e.
g.
,usingpeer-to-peerlesharingsoftware).
Anotherapproachistoimplementstrictaccesscontrolandcopycon-trolofVMimages.
However,thesecontrolsoftenhinderthelegitimateuseofVMs.
Therefore,itisnecessarytoaddresstwoissues:(i)identifyVMim-agesevenaftertheyhavebeenillegallydistributed;and(ii)facilitatelegitimateuseofVMimages.
DigitalwatermarkingofVMimagescanaddressboththeseissues.
However,aswediscussbelow,watermark-ingtechniquesusedforaudioandvideolesarenotapplicabletoVMimages.
Digitalwatermarkingtechnologiestypicallymodifyredundantorun-useddigitalcontent(e.
g.
,inaudiblefrequencyrangesforaudioles)toembedwatermarks.
Inthecaseofaudioandvideoles,modifyingtheoriginalinformationfordigitalwatermarkingproducesimperceptibleef-fectswhenplayingtheles[7].
Incontrast,modifyingaVMimagecancausebootfailureswhenthewatermarkedimageisexecuted.
Ad-ditionally,dataonthewatermarkedVMisfrequentlychangedbecauseofsoftwareupdates,logging,etc.
Unlikeanaudioorvideolewhosecontentisunchanged,aVMimageisessentiallyvariable;consequently,inordertoidentifytheVMimage,theimagehastobewatermarkedaftereverychange.
Datahidingtechniques[5]canbeemployedforwatermarkingVMimages.
Datacanbehiddeninvariouslocations:Areasmarkedasnotinusebythepartitiontable.
Extendedleattributessuchasalternatedatastreams.
Unusedportionsofthelastdataunitsofles(slackspace).
Reservedi-nodesthatarenotusedbytheoperatingsystem.
Portionsthatareexcludedduringconsistencycheckingofajour-nalinglesystem.
Fileshiddenviasteganographyusingspeciallesystemdrivers[6].
Amajordeciencyofexistingdatahidingtechniquesisthelackofplatform-independence:thetechniquesworkonspeciclesystems(e.
g.
,NTFS),operatingsystems(e.
g.
,RedHatLinux)andOSkernelversions(e.
g.
,Linux2.
2.
x).
Itisdicult,ifnotimpossible,toapplyTadano,etal.
259thesetechniquestoVMsinheterogeneousenvironmentswheremultiplelesystems,operatingsystemsandOSkernelversionsareused.
Toaddressthisissue,weproposeadigitalwatermarkingschemeforVMimagesthatisindependentoflesystems,leformats,operatingsystems,OSkernelversionsandhardware.
Theschemeembedsawa-termarkderivedfromthenamesofthelespresentinaVM.
2.
BasicConceptsOurdigitalwatermarkingschemeforVMimagesuseslenamesasawatermark,notthecontentsoftheles.
AuniqueidentieriscreatedforeachVMimageandawatermarkcorrespondingtotheidentierisembeddedintheformoflesinthelesystemoftheVMimage.
Theseembeddedlesarecalled"watermarkfragmentles.
"Ifthenamesofthewatermarkfragmentlesarerandomlycreated,theywouldbereadilydistinguishablefromthenamesofthepre-existinglesontheVM,enablinganattackertoidentifyandsubsequentlyre-movethewatermarkfragmentles.
Thus,thewatermarkingschememakesthefragmentlesdiculttodetectbycreatingfragmentleswithnamesthataresimilartopre-existinglesintheVMandembed-dingthelesinrandomdirectoriesintheVM.
AsecuredatabaseisusedtostoretheidentierofeachVMimageandthecorrespondingwatermarkfragmentles.
3.
DesignandImplementationThissectiondescribesthedesignandimplementationofthedigitalwatermarkingscheme.
3.
1SystemComponentsThesystemhasthreecomponents:(i)awatermarkgenerator;(ii)awatermarkdetector;and(iii)awatermarkinformationdatabase.
Figure1illustratesthewatermarkgenerationanddetectionprocesses.
WatermarkGenerator:ThewatermarkgeneratoremploysthenamesofthewatermarkfragmentlesasthewatermarkforaVMimage.
ItcreatesawatermarkedVMimagebyembeddingthewatermarkfragmentlesintheVMimageandstoresthegeneratedlenamesinthewatermarkinformationdatabase.
TheVMimagetobewatermarkediscreatedbycopyingthetemplateVMimagele.
SincethetemplateVMimagesareusedastheoriginaldataforwatermarking,theseimagesshouldbesecurelymanaged.
ThereasonisthatanattackerwhoobtainstheVMimagetemplate260ADVANCESINDIGITALFORENSICSVIIdentifierCertaintyWatermarkGenerationWatermarkDetectionWatermarkInformationDatabaseWatermarkGeneratorWatermarkDetectorWatermarkedVMImageVMImageTemplateWatermarkInformationDatabaseFigure1.
Watermarkgenerationanddetection.
wouldbeabletocomputethewatermarkfragmentlesasthedierencebetweenthetemplateVMimageandthewatermarkedVMimageles.
DetailsofthewatermarkgenerationalgorithmarepresentedinSection3.
2.
WatermarkedVMImageIDVMNameOwnerWatermarkFragmentFiles5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8foo-desktopfoo/etc/yum/aaa.
conf,/var/log/dummy.
log42be8a40-5e6d-4677-84fb-e387f5638264bar-desktopbar/usr/local/bin/cmd,/etc/dummy.
conf…………WatermarkInformationDatabaseTableWatermarkFragmentFiles/etc/yum/aaa.
conf/var/log/dummy.
logID:5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8Figure2.
Samplerecordsinthewatermarkinformationdatabase.
WatermarkInformationDatabase:Thewatermarkinforma-tiondatabase(WI-DB)storestheidentierofeachVMimageanditsattributes.
TheidentierforaVMimageisauniversallyuniqueidentier(UUID).
Theattributesincludethenamesofthewatermarkfragmentles,VMowner,etc.
(Figure2).
OnlyauthorizedusersshouldbepermittedtoreadandwriteWI-DBrecords.
Anattackerwithread/writeaccesscouldalterWI-DBrecordsoridentifyanddeletethewatermarkfragmentlesembeddedinaVMimage.
WatermarkDetector:ThewatermarkdetectoridentiesaVMusingthewatermarkfragmentlesembeddedinthetargetVMim-agebasedonWI-DBrecords.
WhenanunauthorizedleakofaVMimageissuspected,theadministratormayperformthedetectionprocesstoidentifytheVMimageanditsowner.
Tadano,etal.
261TargetVMImage/var//etc//usr//home//bin/…DirectoryTreeonVM1.
ObtainthenamesoftheWatermarkFragmentFiles2.
SearchthefilesintheVMImageIDVMNameOwnerWatermarkFragmentFiles5ac8183d-e2cb-4ad2-a185-5c3beb0c17b8foo-desktopfoo/etc/yum/aaa.
conf,/var/log/dummy.
log42be8a40-5e6d-4677-84fb-e387f5638264bar-desktopbar/usr/local/bin/cmd,/etc/dummy.
conf…………WatermarkInformationDatabaseTableID:unknownFigure3.
Watermarkdetection.
Figure3illustratesthedetectionprocess.
IftheidentierofthetargetVMcanbeguessed,thewatermarkgeneratorlooksupthecorrespondingWI-DBrecord.
Otherwise,thewatermarkdetectorcomparesthewatermarkfragmentlenamesinWI-DBrecordswiththoseinthetargetVMimage.
ThewatermarkgeneratorthenoutputsacertaintyvalueoftheidentierofthetargetVMimage.
ThecertaintyvalueiscomputedasthepercentageofthenamesofthewatermarkfragmentlesintheWI-DBrecordthatmatchlenamesintheVMimage.
Notethatsomewatermarkfragmentlesmayhavebeendeletedorrenamedonpurposeorbyaccident.
3.
2WatermarkGenerationAlgorithmThissectionbrieydescribestheprocessofgeneratingthewatermarkfragmentlesforthetargetVMimage.
Thealgorithmhasvesteps.
Step1:Inputtheparametersrequiredforwatermarkgeneration.
Step2:NumberthedirectoriesinthetargetVMimageindictio-naryorder.
Step3:Selectthedirectoriestoembedwatermarkfragmentles.
Step4:Generatethenamesofthewatermarkfragmentlestobecreated.
Step5:GeneratethecontentsofthewatermarkfragmentlesforthedirectoriesselectedinStep3.
262ADVANCESINDIGITALFORENSICSVITable1.
Directorycodelist.
NumberDirectoryName1/2/etc/3/etc/init.
d/4/etc/ldap/5/etc/skel/6/etc/ssh/7/etc/sysconfig/.
.
.
.
.
.
Step1(InputParametersforWatermarkGeneration):Thefollowinginputparametersarerequiredforwatermarkgeneration:NumberofWatermarkFragmentFiles:Thelargerthenum-berofwatermarkfragmentles,themoretamper-resistantisthewatermark.
However,thisincreasesthetimerequiredtogeneratewatermarkfragmentles.
ExcludedDirectories:Somedirectories(e.
g.
,temporarydirec-tories)shouldbeexcludedbecauselesinthesedirectorieschangefrequently.
ExcludedSuxes:Thesearesuxesthatshouldbeexcludedfromthenamesofthewatermarkfragmentles.
BitLength:ThebitlengthisaparameterusedbytheBlum-Blum-Shub(BBS)algorithm[4]togeneratecryptographically-sec-urepseudo-randomnumbers.
Thisparameteraectsthecomputa-tionaltimeandsecurity,andissetto1024bitsinourexperiments.
Step2(NumbertheDirectoriesintheTargetVMImage):ThewatermarkgeneratorsearchesallthedirectoriesinthetargetVMimagerecursivelyandgeneratesa"directorycodelist"(Table1).
TheexcludeddirectoriesidentiedinStep1arenotnumbered.
ThedirectorycodeofatemplateVMimagecanbereusedwhennewwatermarkedVMimagesarecreatedfromthesametemplateVMimagebecausetheyhavethesamedirectorytreestructure.
Thisreducestheprocessingtime.
Step3(SelectDirectoriestoEmbedWatermarkFragmentFiles):Thewatermarkgeneratorproducespseudo-randomnumbersforthewatermarkfragmentlesinputinStep1.
ThevaluesoftheTadano,etal.
263randomnumbersarelimitedtotherangeofdirectorycodes.
Thewa-termarkgeneratorextractsthenamesofdirectoriescorrespondingtothegeneratedrandomnumbersusingthedirectorycodelistgeneratedinStep2.
TheBBSpseudo-randomnumbergenerationalgorithmisusedtomaketherandomnumbersdicultforanattackertopredict.
Althoughthisalgorithmiscomputationallyintensive,theexperimentalresultspresentedinSection4.
2indicatethattheoverallperformanceofthewatermarkingschemeisacceptable.
Step4(GeneratetheNamesofWatermarkFragmentFiles):ThewatermarkgeneratorcreatesthenamesofthewatermarkfragmentlesthatareembeddedinthedirectoriesselectedinStep3.
Portionsofthenamesofpre-existinglesinthedirectoriesaremodiedtocreatelenamesthataresimilartothoseofthepre-existingles.
Alenameisgeneratedaccordingtothefollowingsteps.
Step4.
1:Getthenamesofexistinglesinthetargetdirectory.
Onlyregularles(notsubdirectories,hiddenles,etc.
)whosesuxesarenottobeexcludedareretrieved.
Step4.
2:Enumerateallthesubstringscorrespondingtothelenames.
Eachsubstringisobtainedfromthehead(i.
e.
,notinclud-ingthesux)ofalenameretrievedinStep4.
1.
Theresultofthisstepistheunionofsubstringsforallthelenames.
Forexam-ple,ifthetargetdirectoryhasalenamedabc.
txt,thepossiblesubstringsare:abc,abanda.
Step4.
3:Compute"similaritygroups"foreachextractedsub-string.
Asimilaritygroupisagroupoflesinthetargetdirectorythatmeetsthefollowingconditions:(i)thelenamestartswiththesubstring(prex)generatedinStep4.
2;(ii)alltheleshavethecommonsux(e.
g.
,.
txt);and(iii)asimilaritygroupcon-tainsatleasttwoles.
Forexample,iftherearevelesinatargetdirectory{s1.
txt,s2.
txt,s3.
dat,s4.
dat,s5.
conf}andsisthesubstring,thentwosimilaritygroupscanbecomputed:{s1.
txt,s2.
txt}and{s3.
dat,s4.
dat}.
Step4.
4:ComputetheDsimscoreforeachsimilaritygroup:Dsim=c1lp+c2nfc3ldwherelpisthelengthoftheprexofthesimilaritygroup;nfisthenumberoflesinthesimilaritygroup;ldisthemeanvalueofthedierencebetweenthelengthofthelename(excludingthe264ADVANCESINDIGITALFORENSICSVIsux)andlpinthesimilaritygroup;andc1,c2,c3areparametersthataresettoone.
ThesimilaritygroupwiththehighestDsimscoreiscalledthe"prototypelegroup.
"Step4.
5:Createthenameofthenewwatermarkfragmentle.
Oneormorerandomlettersareaddedtothetailoftheprexoftheselectedprototypelegroup.
Thelengthoftheaddedlet-ters(lt)isthelengthofthelenamerandomlyselectedfromtheprototypelegroup(excludingthesuxandprex).
Finally,thesuxofthelesintheprototypelegroupisaddedtothelename.
Forexample,iftheprexissampleandtheprototypelegroupis{sample.
dat,sample-bak.
dat}andifsample-bak.
datisselected,thenlt=4andapossiblenameissampledbha.
dat.
Step5(GeneratetheContentoftheWatermarkFragmentFiles):Thewatermarkgeneratorcreatesthecontentandattributescorrespondingtoeachwatermarkfragmentle.
Thecontentofawater-markfragmentleisarandomly-generatedbytesequence.
Attributesofawatermarkfragmentlearedeterminedaccordingtothefollowingrules.
Fortimestamps(creation/modication/access)andlesize,thewatermarkgeneratorassignsthemeanvaluesofthelesintheprototypelegrouptothenewwatermarkfragmentle.
Forotherattributessuchasownershipandpermission,thevaluescorrespondingtoarandomlyselectedleintheprototypelegroupareused.
3.
3ImplementationThedigitalwatermarkingschemewasimplementedinJava1.
5.
TheVMwareServervirtualizationsoftwarewasemployed.
Thecommandvmware-mount.
plwasissuedtotheVMwareServertomountthelesystemontheVMimageforembeddingwatermarkfragmentles.
TheVMimageofanylesystemoroperatingsystem,includingWindowsandLinux,canbewatermarked.
TheWI-DBwasimplementedusingMySQL5.
0.
4.
ExperimentalSetupandResultsThissectiondescribestheexperimentalsetupusedtoevaluatethewa-termarkingalgorithm.
Also,itpresentstheexperimentalresultsrelatedtowatermarkgenerationanddetection.
4.
1ExperimentalSetupAtestenvironmentwascreatedtoevaluatetheperformanceofthewatermarkingscheme.
Theenvironmentincludedonephysicalhost(Ta-Tadano,etal.
265Table2.
Testenvironment.
PhysicalHostCPUPentium41.
73GHzProcessorMemory1GBRAMHostOSUbuntuLinux8.
04ServerVMMVMwareServer2.
0GuestVMsGuestOSUbuntuLinux8.
04CentOS5.
1(JeOSedition)(default)VMImageSize183MB2,750MB(.
vmdkfile)Directories1,1207,429ble2).
TwotemplateVMimagesofdierentsizeswereusedtoclarifytheimpactofsizeonthewatermarkingscheme.
TheVMimagesusedwereanUbuntuLinux8.
04ServerJeOSedition(minimumcongurationforvirtualappliances)andadefaultinstallationofCentOS5.
1.
4.
2ExperimentalResultsThissectionpresentsourexperimentalresultsrelatedtowatermarkgenerationanddetection.
WatermarkGenerationTheVMimagetemplatesofUbuntuandCentOSwerecopiedandatotalof10and100watermarkfragmentleswereembeddedinthetwoVMimages.
Eachexperimentwasrepeated10timesandtheaverageturnaroundtimeswerecalculated.
Table3.
Turnaroundtimesforwatermarkgeneration.
Av.
GenerationTime(sec)Av.
Copying10Files100FilesTime(sec)UbuntuLinux8.
0413.
12124.
0016.
903CentOS5.
1168.
382177.
270142.
284Table3presentstheturnaroundtimesforcopyingVMimagesandgeneratingwatermarks.
Theexperimentsusedpreviously-createddirec-torycodesoftemplateVMimagesbecausethecodesaregeneratedonlythersttimethatthetemplateVMimagesareused.
Theresultsin-dicatethatthetimeforwatermarkgenerationexcludingthetimefor266ADVANCESINDIGITALFORENSICSVITable4.
Generatedwatermarkfragmentles.
FileNames/usr/share/zoneinfo/Pacific/kQGidyI/etc/console-tools/v2uQizvontwL8/lib/modules/2.
6.
24-16-virtual/kernel/sound/usb/snd-usb-INc.
ko/usr/lib/klibc/bin/hso.
shared/usr/lib/perl/5.
8.
8/IO/Socket/vS9jkE.
pm/usr/lib/python2.
5/wsgiref/hG272nT.
pyc/usr/share/debconf/jAGX7mQ.
sh/usr/share/zoneinfo/Mexico/irQ7KA/usr/share/zoneinfo/posix/Chile/5XwjAcopyingisessentiallyindependentofthesizeofthetemplateVMimage.
Theturnaroundtimesdropwhenfasterstoragedevicesareemployed.
Table4liststhegeneratedwatermarkfragmentles.
Thelenamessnd-usb-INc.
koandhso.
sharedarerelativelydiculttodistinguishfromthepre-existinglesinthetargetdirectories.
Incontrast,lenamessuchaskQGidyIareeasilydistinguishable.
Ingeneral,whentherearemanylesinthetargetdirectorywhosenameshavecommonextensionsandlongcommonsubstrings,thegeneratedlename(s)tendtobeindistinguishable.
Forexample,thelesnd-usb-INc.
kobelongsto/lib/modules/2.
6.
24-16-virtual/kernel/sound/usb/whosepre-existinglesaresnd-usb-audio.
koandsnd-usb-lib.
ko.
Meanwhile,ifonlyafewlenameshavecommonsubstrings/extensionsinthetargetdirec-tory,thegeneratedlename(s)tendtobecontrived.
WatermarkDetectionWatermarkdetectionexperimentswerecon-ductedtoidentify10and100watermarkfragmentlesfromthewater-markedUbuntu8.
04andCentOS5.
1VMimages.
Table5.
Turnaroundtimesforwatermarkdetection.
Av.
DetectionTime(sec)10Files100FilesUbuntuLinux8.
047.
5247.
549CentOS5.
17.
5267.
573Table5presentstheaverageturnaroundtimesforwatermarkdetec-tionbasedontenrepetitions.
Theresultsindicatethatthetimetakentodetectthewatermarkisalmostindependentofthesizeofthewater-markedVMimageandthenumberofwatermarkfragmentles.
Tadano,etal.
2675.
ConclusionsThedigitalwatermarkingschemeforVMimagesisindependentoflesystems,leformats,operatingsystems,kernelversionsandhardware.
Also,experimentsdemonstratethatwatermarkgenerationanddetectionarebothfastandeective.
Ourfutureworkwillfocusonenhancingthetamper-resistantcharac-teristicsofthewatermarkingscheme.
SeveralattackscouldbedevisedtoremoveormodifyVMimagewatermarks.
Forexample,watermarkscouldbedetectedusingamachinelearningalgorithmsuchtextcluster-ing[9]todiscriminateembeddedlesfrompre-existinglesbasedonlenamestringfeatures.
AnotherattackcoulduseinformationfromelsewhereintheVMsuchasthei-nodenumbersofles.
Filesinstalledatagiventimeareassignedsuccessivei-nodenumbers;alewithani-nodenumberthatisoutofsequencecouldcorrespondtoanembeddedle.
Otherproblemstobeinvestigatedincludehavingthecontentsofembeddedlesresemblethoseofpre-existingles,andaugmentingtheschemewithotherdatahidingapproachestoenhancetamperresistance.
Finally,ourresearchwillinvestigatetheapplicationofthewatermarkingschemetootherdigitalcontentsuchastarandziparchives.
References[1]AmazonWebServices,AmazonElasticComputeCloud,Seattle,Washington(aws.
amazon.
com/ec2).
[2]AmazonWebServices,AmazonSimpleStorageService,Seattle,Washington(s3.
amazonaws.
com).
[3]AmazonWebServices,ec2-download-bundle,Seattle,Wash-ington(docs.
amazonwebservices.
com/AmazonEC2/dg/2006-10-01/CLTRG-ami-download-bundle.
html).
[4]L.
Blum,M.
BlumandM.
Shub,Comparisonoftwopseudo-randomnumbergenerators,inAdvancesinCryptology:Proceed-ingsofCrypto1982,D.
Chaum,R.
RivestandA.
Sherman(Eds.
),Plenum,NewYork,pp.
61–78,1982.
[5]K.
EcksteinandM.
Jahnke,Datahidinginjournalinglesystems,ProceedingsoftheFifthAnnualDigitalForensicResearchWork-shop,2005.
[6]A.
McDonaldandM.
Kuhn,StegFS:AsteganographiclesystemforLinux,ProceedingsoftheThirdInternationalWorkshoponIn-formationHiding,pp.
463–477,2000.
268ADVANCESINDIGITALFORENSICSVI[7]F.
Perez-GonzalezandJ.
Hernandez,Atutorialondigitalwater-marking,ProceedingsoftheThirty-ThirdIEEEInternationalCar-nahanConferenceonSecurityTechnology,pp.
286–292,1999.
[8]N.
QuynhandY.
Takefuji,Anovelapproachforale-systemin-tegritymonitortoolforaXenvirtualmachine,ProceedingsoftheSecondACMSymposiumonInformation,ComputerandCommu-nicationsSecurity,pp.
194–202,2007.
[9]T.
Segaran,ProgrammingCollectiveIntelligence:BuildingSmartWeb2.
0Applications,O'Reilly,Sebastopol,California,2007.

棉花云1折起(49元), 国内BGP 美国 香港 日本

棉花云官网棉花云隶属于江西乐网科技有限公司,前身是2014年就运营的2014IDC,专注海外线路已有7年有余,是国内较早从事海外专线的互联网基础服务提供商。公司专注为用户提供低价高性能云计算产品,致力于云计算应用的易用性开发,并引导云计算在国内普及。目前公司研发以及运营云服务基础设施服务平台(IaaS),面向全球客户提供基于云计算的IT解决方案与客户服务(SaaS),拥有丰富的国内BGP、双线高防...

亚州云-美国Care云服务器,618大带宽美国Care年付云活动服务器,采用KVM架构,支持3天免费无理由退款!

官方网站:点击访问亚州云活动官网活动方案:地区:美国CERA(联通)CPU:1核(可加)内存:1G(可加)硬盘:40G系统盘+20G数据盘架构:KVM流量:无限制带宽:100Mbps(可加)IPv4:1个价格:¥128/年(年付为4折)购买:直达订购链接测试IP:45.145.7.3Tips:不满意三天无理由退回充值账户!地区:枣庄电信高防防御:100GCPU:8核(可加)内存:4G(可加)硬盘:...

野草云99元/月 ,香港独立服务器 E3-1230v2 16G 30M 299元/月 香港云服务器 4核 8G

野草云月末准备了一些促销,主推独立服务器,也有部分云服务器,价格比较有性价比,佣金是10%循环,如果有时间请帮我们推推,感谢!公司名:LucidaCloud Limited官方网站:https://www.yecaoyun.com/香港独立服务器:CPU型号内存硬盘带宽价格购买地址E3-1230v216G240GB SSD或1TB 企盘30M299元/月点击购买E5-265016G240GB SS...

amazonec2为你推荐
microcenter求解MC全称站酷zcool北京站酷网络科技有限公司怎么样?微信回应封杀钉钉为什么微信被封以后然后解封了过了一会又被封了www.hao360.cn每次打开电脑桌面都出现以下图标,打开后链接指向www.hao.360.cn。怎么彻底删除?原代码源代码是什么lunwenjiancepaperfree论文检测安全吗百花百游百花净斑方效果怎么样?www.zjs.com.cn怎么查询我的平安信用卡寄送情况www.se222se.comhttp://www.qqvip222.com/朴容熙这个女的叫什么?
域名升级访问中 免费二级域名注册 国外vps主机 godaddy续费优惠码 双11抢红包攻略 密码泄露 双拼域名 帽子云 双十一秒杀 可外链网盘 佛山高防服务器 中国电信宽带测速网 万网空间 阿里云手机官网 徐州电信 好看的空间 中国电信宽带测速 万网服务器 512内存 百度新闻源申请 更多