期刊文献+

基于PTM的可信虚拟平台方案 被引量:1

A scheme of trusted virtualization platform based on PTM
下载PDF
导出
摘要 在多种信息系统中,将虚拟化技术与可信计算相结合的方式是一种保障系统安全的有效手段.然而,传统基于可信平台模块(TPM)的可信系统存在着系统信任基础不明确与数据迁移计算开销大的不足.本文应用便携式可信模块(PTM)信任模型,基于Xen虚拟化平台提出了一种客户端可信虚拟化平台方案——OASIS,设计并实现了OASIS平台结构、可信启动信任链建立方法及数据迁移机制.本方案具有灵活高效、以用户为中心的特点,使用PTM作为系统信任基础,为用户提供个人化可信计算环境,为用户在多平台间漫游的应用场景提供极大的便利性.原型系统测试结果表明,本方案具有可行性. In information systems, the method that combines virtualization with trusted computing is effective for system security insurance. However, the trusted root of the system is unclear to the user in traditional trusted systems based on TPM, and the computational overhead of data mi- gration is extremely high. A client side trusted virtualization platform scheme, OASIS, based on the Xen hypervisor is proposed by applying the PTM trust model. We design and implement the platform architecture, the trust chain establishing method, and the data migration mechanism. The system is flexible, efficient, and user-centered. It provides personalized trusted computing environment by utilizing PTM as the root of trust in a system, and can be convenient in the see- narios that the user roams between devices. The experiment results of the prototype system indicate that the scheme of our Matform is feasible.
出处 《北京交通大学学报》 CAS CSCD 北大核心 2013年第5期67-74,共8页 JOURNAL OF BEIJING JIAOTONG UNIVERSITY
基金 中央高校基本科研业务费专项资金资助(2011JBM228)
关键词 信息安全 可信计算 虚拟化 便携式可信模块 information security trusted computing virtualization portable trusted module
  • 相关文献

参考文献9

  • 1Jonathan M Mccune, Adrian Perrig, Arvind Smshaclri, et al. Turtles all the way down: Research challenges in user- based attestation [C]//Proceedings of the 2nd USENIX Workshop on Hot Topics in Security ( HOTSEC' 07), New York, 2007.
  • 2ZHANG Dawei, HAN Zhen, YAN Guangwen. A portable TPM based on USB key[C]//Proceedings of the 17th ACM Conference on Computer and Communications Secu- rity, New York, 2010:750 - 752.
  • 3Tal Gareinkel, Ben Pefaff, Jim Chow, et al. Terra: A vir- tual machine-based platform for trusted computing [ C]// Proceedings of the 19th ACM Symposium on Operating Systerns Principles, New York, 2003 : 193 - 206.
  • 4Reiner Sailer, Trent Jaeger, Enriquillo Valdez, et al. Building a MAC-based security architecture for the xen open- source hypervisor [ C ]//Proceedings of the 21 st An- nual Computer Security Applications Conference, Wash- ington IX;,2005:276- 285.
  • 5Rich Ublig, Gil Neiger, Amy L Santoni, et al. Intel virtu- alization technology[J]. IEEE Computer, 2005,38: 48 - 56.
  • 6Ronald Perez, Reiner Sailer, Leendert Van Doom. Virtu- alization and hardware-based security [ J ]. 1EEE Security & Privacy,2008,6(5) :24 - 31.
  • 7Paul Barham, Boris Dragovic, Keir Fraser, et al. Xen and the art of virtualization[ C] //Proceedings of the 19th ACM Symposium on Operating Systems Principles, New York, 2003:164 -177.
  • 8LIU Qian, WENG Chuliang, LI Minglu, et al. An In- VM measuring framework for increasing virtual machine curity in cloudsEJ], IEEE Security and Privacy, 2010,8 (6) :56- 62.
  • 9International Standard ISO/IEC 7816 - 3, Cards with con- tacts-electrical interface and transmission protocols [ S]. 2006.

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部