期刊文献+

一种高效的虚拟桌面可信保证机制 被引量:5

An Efficient Trusted Virtual Desktop Assuring Mechanism
下载PDF
导出
摘要 虚拟桌面系统与传统PC桌面系统结构的不同,导致其在保证安全机制自身可信的同时,也会带来"语义差别"和效率降低等问题。提出了一种安全虚拟机完整性监控机制SVMIM(security virtual machine integrity monitor)。SVMIM采用混杂模式的安全结构,基于可信计算技术对虚拟桌面系统的代码加载过程进行监视和控制,有效克服"语义差别"问题,并保证安全机制自身的可信;同时,SVMIM基于虚拟桌面网络引导机制,在网络存储端使用存储克隆技术,最大程度地降低安全机制对系统性能的影响。系统性能分析和基于SVMIM原型系统进行的实验表明,该技术是可行的,并且相对于传统的虚拟桌面安全保障方案具有较大的性能优势。 The difference in structure between virtual desktop system and traditional PC desktop system causes "semantic differences" and efficiency issues, when improving the trust level of the security mechanisms of virtual desktop system. A security virtual machine integrity monitor (SVMIM) was build based on network bootstrap mechanism. SVMIM adopted a hybrid security structure, monitored and controlled the loading process of executable files in virtual desktop systems, which could effectively overcome the shortcomings of "semantic gap" and ensure the trustworthiness of security mechanism. In addition, SVMIM used storage clone technology on network storage to reduce the impact of security mechanism to the system performance. The performance testing on SVMIM prototype and the performance analysis showed its flexibility and advantage.
出处 《四川大学学报(工程科学版)》 EI CAS CSCD 北大核心 2014年第1期29-34,共6页 Journal of Sichuan University (Engineering Science Edition)
基金 国家"973"重点基础研究发展规划资助项目(2007CB307101) 教育部高等学校博士学科点专项科研基金资助项目(20120009110007) 教育部高校创新团队项目(IRT201206) 2012年铁道部科技研究开发计划资助项目(2012X010-B)
关键词 虚拟桌面 可信平台 完整性度量 存储克隆 virtual desktop trusted platform integrity measurement storage clone
  • 相关文献

参考文献13

  • 1Barham P,Dragovic B,Fraser K. Xen and the art ofvirtualization[J].ACM SIGOPS Operating Systems Review,2003,(05):164-177.
  • 2VMware,Inc. VMware[EB/OL].http://www.vmware.corn/,2013.
  • 3Gebhardt C,Dalton C I,Brown R. Preventing hypervisorbased rootkits with trusted execution technology[J].Network Security,2008,(11):7-12.
  • 4Hohmuth M,Peter M,Hartig H. Reducing TCB size by using untrusted components:Small kernels versus virtual-machine monitors[A].New York:ACM,2004.22.
  • 5The Trusted Computing Group. TCG[EB/OL].https://www.trustedcomputinggroup.org/,2013.
  • 6Berger S,Cáceres R,Pendarakis D. TVDc:Managing security in the trusted virtual data center[J].ACM SIGOPS Operating Systems Review,2008,(01):40-47.
  • 7Garfinkel T,Pfaff B,Chow J. Terra:A virtual machine-based platform for trusted computing[A].New York:ACM,2003.193-206.
  • 8Payne B D,de Carbone M D P,Lee W. Secure and flexible monitoring of virtual machines[A].Miami Beach:IEEE,2007.385-397.
  • 9Chen P M,Noble B D. When virtual is better than real[operating system relocation to virtual machines[A].Piscataway:IEEE,2001.133-138.
  • 10Payne B D,Carbone M,Sharif M. Lares:An architecture for secure active monitoring using virtualization[A].Oakland:IEEE,2008.233-247.

同被引文献23

引证文献5

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部