期刊文献+

基于可信平台模块的虚拟机安全协议 被引量:6

Security protocols based on trusted platform module for virtual machine system
下载PDF
导出
摘要 为了保证虚拟机间通信的安全,存取控制是经常采用的手段。但是存取控制的灵活性和扩展性都有一定的限制。为了克服这一局限性,本文提出了一套针对虚拟机系统的安全协议。安全协议以可信平台模块作为可信根,建立起从底层硬件到虚拟机中应用的信任路径,从而有效并安全地实现了密钥及证书的发放、身份认证、虚拟机间保密通信和密钥及证书更新的功能。此外,本文在Xen中成功实现了这套安全协议。 Access control is the widely used way to guarantee the security of communication between virtual machines (VMs). But it is limited in flexibility and scalability. To overcome this limitation, this paper proposes a suite of security protocols for virtual machine systems. These security protocols establish a trusted path from bottom hardware to applications in VMs, by utilizing trusted platform module (TPM) as the trusted root. As a result, security functions, including granting key and certificate, identity authentication, secure communication between VMs, key and certificate update, are fulfilled successfully. Besides, these security protocols are implemented in Xen.
出处 《信息安全与技术》 2010年第6期49-55,共7页
基金 国家重点基础研究发展计划(973计划)项目计算系统虚拟化基础理论及方法研究[2007CB310900]
关键词 虚拟机 安全协议 身份鉴别 可信平台模块 virtual machine security protocol identity authentication trusted platform module
  • 相关文献

参考文献1

共引文献6

同被引文献42

  • 1陈丹伟,陈春玲.分布式防火墙体系结构的研究[J].计算机应用与软件,2004,21(10):101-103. 被引量:9
  • 2周建峰,马玉祥,欧阳雄.PKI信任模型研究[J].电子科技,2006,19(4):75-78. 被引量:7
  • 3英特尔开源软件技术中心,复旦大学并行处理研究所.系统虚拟化:原理与实现[M].北京:清华大学出版社,2009.
  • 4Jenni Susan Reuben. A survey on virtual machine security[C]// TKK T-110.5290 Seminar on Network Security. 2007..
  • 5Trusted Computing Group. TCG Specification[EB/OL]. https://www.trustedcomputinggroup.org, 2013-02-01..
  • 6Trusted Computing Group. TCG Specification Architecture Overview, Specification Revision 1.4[EB/OL]. http://www.trustedcomputinggroup.org/files/resource_files/AC652DE1-1D09-3519-ADA026A0C05CFAC2/TCG_1_4_Architecture_Overview.pdf, 2007-08-02..
  • 7Trusted Computing Group. TPM Main Part 1 Design Principles_ Specification Version 1.2. 2005[EB/OL]. http://www.trustedcomputinggroup.org/files/resource_files/845D2365-1D09-3519-AD77B79A36A2ECC1/TPM%20main%201.2, %20rev85%20part%201.pdf, 2005-02-13..
  • 8Perlman R. An overview of PKI trust models[J]. IEEE Network, 1999,13(6):38-43..
  • 9Advanced Micro Devices, Inc. AMD Virtualization[EB/OL]. http://sites.amd.com/us/business/it-solutions/virtualization/Pages/virtualization.aspx, 2013-02-01..
  • 10Intel Corporation. Intel Itanium Architecture Software Developer’s Manaual, 2006[EB/OL]. http://www.intel.com/design/itanium/manuals/iiasdmanual.htm, 2013-02-01.

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部