期刊文献+

一种基于XEN平台的可信虚拟机迁移协议 被引量:1

An XEN Platform Based Trusted Virtual Machine Migration Protocol
下载PDF
导出
摘要 为保证可信虚拟机迁移的安全性,并减少迁移后在目的端密钥的重新生成,采用一种适于迁移的vTPM密钥层次,并在此基础上提出一种增加了双方身份和平台状态认证的可信虚拟机迁移协议。首先,引入中间层gSRK、SK实现对vSRK、vAIK的间接保护和签名,以此确保vTPM密钥在目的平台的重新使用;其次,在迁移前增加双方身份和平台状态认证,并使用D-H算法协商会话密钥,为双方建立一个可信的通信通道。最后,基于XEN平台利用协商好的会话密钥进行可信虚拟机的迁移。分析表明,该协议能够有效保证可信虚拟机迁移的安全性要求。 A suitable vTPM key hierarchy for migration was used to ensure the safety of the trusted virtual machine migration And to reduce the key reduction in the destination After migrAtion. Based on the vTPM key hierarchy ,proposed an improved trusted virtual machine migration protocol,which was Added with matual identity and platform state certification. Firstly,to ensure the vTPM key reused in the destination,a intermediate layer ,which was consists of gSR, K and SK ,was imported to realize the indirect protection And signature to vSR,K And vAIK. Secondly,added the mAtual identity and platform state certification before migration,And used the D-H algorithm to negotiate session key, establishing a trusted communication channel for both sides. Finally, realized the trusted virtual machine migration based on the XEN platform And the session Key. AnAlysis shows that, the protocol can effectively guArAntee the trusted virtual machine migration safety requirements.
出处 《计算机安全》 2013年第3期13-18,共6页 Network & Computer Security
关键词 可信虚拟机 迁移 身份认证 平台状态认证 trusted virtual machine migrAtion identity certification platform state certification
  • 相关文献

参考文献13

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2Berger the trusted conference o S, Caceres,P, Goldman,K A platform module[C]. Proceed n USENIX Security Symposium, vTPM ngs of 2006. virtualizing the 15th.
  • 3Sadeghi AE, Stuble C, Winandy M. Property_based tpm virtualization[C]. Proceedings of the l lth international conference on InformariCh Security, 2008.
  • 4Gasmi Yacine, Sadeghi Ahmad-Peza, Stewin Patrick Beyond secure channels[C]. Proceedings of the ACM Conference on Computer and Communications Security, STC'07 Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, 2007.
  • 5Nuno Santos, Krishna P Gummadi, Podrigo Podrigues. Towards Trusted Cloud Computing[C]. Proceedings of the 2009 conference on Hot topics in cloudcomputing. SanDiego, California:USENIX Association, 2009.
  • 6PJ Masti. on the Security of Virtual Machine Migration and Eelated Topics[D]. Switzerland:ETH zurich, 2010.
  • 7Jayaram Masti, lamya. Enabling Secure VM-vTPM Migration in Private Clouds[C]. ACM International Conference Proceeding Series, Proceedings 27th Annual Computer Security Applications Conference, ACSAC 201.
  • 8Pobert Bradford, Evangelos Kotsovinos, Anja Feldmann Live wide-area migration of virtual machines including local persistent nternatlona 2007 state[el. In NEE' 07 conference on Virtual Proceeding of the $rd execution environments ,.
  • 9Christ of virtua USSENIX opher Clark, Keir Fraser, Steven H.Live migration I machines[C]. In Proceedings of the 2rid ACM/ Symposium mplementation(NSDI), on Networked Systems Design and 2005.
  • 10王丽娜,高汉军,余荣威,任正伟,董永峰.基于信任扩展的可信虚拟执行环境构建方法研究[J].通信学报,2011,32(9):1-8. 被引量:24

二级参考文献116

共引文献267

同被引文献6

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部