期刊文献+

IaaS下虚拟机的安全存储和可信启动 被引量:3

Secure Storage and Trusted Launch of Virtual Machine in IaaS
原文传递
导出
摘要 针对大多数现有技术主要依据可信硬件来保护虚拟机(VM,virtual machine)运行平台的安全,而缺乏对VM安全存储和可信启动保护的问题,提出了一种解决在云平台基础设施服务策略(IaaS,Infrastructure as a Service)下VM的安全存储和可信启动(SSTL,secure storage and trusted launch)方案.根据可信平台模块(TPM,trusted platform module)的一些核心功能,分别从VM镜像加解密、VM宿主平台信息的远程证明和VM度量机制来保证VM存储安全、VM运行环境的安全以及VM可信启动.实验测试与分析表明该系统能够防止非授权启动VM,并能检测针对VM的系统服务描述符表(SSDT,system services descriptor table)以及Kernel Module等系统核心模块攻击.并且对原有系统的性能损耗在允许范围之内,不影响用户的正常使用. Aiming at most of the existing technologies mainly based on trusted hardware technology to protect the running environment of Virtual Machine (VM, Virtual Machine) are lacking of protection for VM storage and launch, a mechanism on secure storage and trusted launch of VM in haS(Infrastructure as a Service)is designed. According to some core functions of TPM(trusted platform module), the secure storage , running environment and trusted launch of VM can be assured by the VM image encryption, the remote attestation of VM host platform and VM measurement mechanism. Experimental test and analysis show that the system can protect the VM from unauthorized launching and detect the attack on the core modules of VM, such as SSDT, Kernel Module and so on. And its performance payload is in the range of acceptance, without affecting the user's daily use.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2014年第3期231-236,共6页 Journal of Wuhan University:Natural Science Edition
基金 国家自然科学基金资助项目(61272452,61003268,9111803,61303024,61173138) 国家重点基础研究发展计划项目(973)(2014CB340600)
关键词 虚拟机 远程证明 虚拟机存储 虚拟机度量 virtual machine; remote attestation; VM(virtual machine) storage; VM(virtual machine) measurement
  • 相关文献

参考文献12

  • 1Tygar J D.Yee B S.Dyad:A system for using physi-cally secure coprocessors [DB/OL].[2013-12-16].http://repository.cmu.edu/compsci/2081/? utm_ source = repository.cmu.edu% 2Fcompsci% 2F2081&utm_medium= PDF&utm_campaign = PDFCoverPages.
  • 2Clark P C.Hoffman L J.BITS:A smart card protected operating system [J].Communications of the ACM.1994.37(11):66-70.
  • 3Arbaugh W A.Farber D J,Smith J M.A secure and reliable bootstrap architecture[C]//Security and Privacy.Oakland:IEEE Press.1997:65-7l.
  • 4Azab AM.Ning P.Wang Z.et al.Hyper Sentry,Enabling stealthy in-context measurement of hypervisor integrity[C]//Proceedings of the 17th ACM Con-ferenee on Computer and Communications Security.New York:ACM Press.2010:38-49.
  • 5Sun Kun,Wang Jiang.Zhang Fengwei,etal.SecureSwitch:BIOS-Assisted isolation and switch between trusted and untrusted commodity OSes[C]//Network and Distributed System Security Symposium.Virgini a:ISOC Press.2012:1-12.
  • 6Garfinkel T.Pfaff B.Chow J.et al.Terra:A virtual machine-based platform for trusted computing [C]//ACM SIGOPS Operating Systems Review.New York:ACM Press,2003,37(5):193-206.
  • 7Grawrock D.Dynamics of a Trusted Platform:A buil.ding block a p pruach [M].California:Intel Press,2009.
  • 8Srivastava A,Raj H,Giffin J,et al.Trusted VM Snapshuts in Untrusted Cloud Infrastructures [M].Berlin:Springer-Verlag,2012.
  • 9SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:39
  • 10Kivity A,Kamay Y,Laor D,et al.KVM:The Linux virtual machine monitor[DB/OL].[2013-12-12].ht-tps://www.kernel.org/doc/mirror/ols2007v1.pdf# page=225.

二级参考文献25

共引文献83

同被引文献44

引证文献3

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部