期刊文献+

Xen虚拟化环境下国密算法可信启动策略的构建

Constructing a Trusted Booting Strategy of the Native Cipher Algorithm in Xen Virtual Enviroment
下载PDF
导出
摘要 为了最大限度地确保Xen虚拟化系统的可信性和安全性,保护虚拟化系统的软件安全和用户隐私数据的安全,对Xen虚拟机及其安全性进行研究分析,结合可信计算技术着重于确保虚拟机启动阶段的可信性和安全性,实现Xen虚拟化环境整体的可信启动过程,并思考利用国密算法可行性和方法,降低对国外密码算法的依赖,避免国外算法存在的安全隐患。能够抵御文中所述的威胁模型并克服部分TPM的局限性,方法有效且可行,且可信启动效率较高。 In order to implement that the security and safety of the Xen virtual machine and user privacy data can be protected up to the hilt, this article will analyze the fundamental principle and safety of Xen virtual machine. Combined with the technique of trusted computing and native cipher algorithm, we focus our attention on ensuring the trust and security of the startup stage, and realize the trusted booting of Xen virtualization environment. Meanwhile, we will also take considerations of using native cipher algorithm. The use of the native cipher algorithm will greatly reduce the dependence on foreign cipher algorithm and avoid the hidden trouble of the foreign cipher algorithm. The method that is effective and feasible in this article can resist the threat model and overcome the limitations of TPM. The efficiency of the trust startup is high.
出处 《计算机安全》 2014年第11期2-7,14,共7页 Network & Computer Security
基金 国家科技支撑计划项目(项目编号:2013BAH15F03)
关键词 可信计算 可信平台模块 USBKEY 国密算法 可信启动 Trusted Computing TPM USBKey native cipher algorithm Trust boot
  • 相关文献

参考文献7

  • 1秦中元,沈日胜,张群芳,狄予兴.虚拟机系统安全综述[J].计算机应用研究,2012,29(5):1618-1622. 被引量:24
  • 2Hongjiao Li,Xiuxia Tian sesearch of Trust Chain of Operating System. Springer Verlag Berlin Heidelberg, 2009.
  • 3XU Min, JIANG Xu xian, SANDHU P,, et al. Towards a VMM based usage control framework for OS kernel integrity protection[C]//Proc the 12th ACM Symposium on Access Control Morde]s and Technology. New York: ACM Press, 2007, 71 -80.
  • 4CATUOGNO L, DMITEIENKO A, EPJKSSON K, et al.Trusted virtual dora&ins: design, implement&tion &rid lessons learned[C]//Proc of International Conference on Trusted Systems. [S. 1.]: Springer, 2010: 156- 179.
  • 5池亚平,王全民,吴丽军.一种基于USBKey的可信测量根安全增强设计方案[J].信息安全与通信保密,2007(12):114-117. 被引量:3
  • 6Peter A Pendergrass, LOBCOCCO, Perry C.Durward McDone W.W Linux Measurement Using Contextual Inspection[C] son, J.Aaron Kernel Integrity Proceedings of the 2007 ACM workshop on Scalable trusted computing Alexandria, Virginia, USA. 21-29.
  • 7TPM Main Part 1 Design Principles[Z]. The Trusted Computing Group, 2003,10:11.

二级参考文献47

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:359
  • 2[3]UEFI,Unified Extensible Firmware Interface Specification version 2.10[S].USA:Intel,January 23,2007.
  • 3[4]The Trusted Computing Group,TCG PC Client Specific TPM Interface Specification[S].USA:TCG,July 11,2005.
  • 4[5][美]Jan Axelson.USB大全[M].陈逸,译.北京:中国电力出版社,2001.
  • 5[6]The Trusted Computing Group,TCG PC Client Specific Implementation Specification for Conventional BIOS[S].USA:TCG,July 13,2005.
  • 6BINU A,KUMAR G S.Virtualization techniques:a methodical reviewof Xen and KVM[C]//Proc of the 1st International Conference onAdvances in Computing and Communications.Berlin:Springer-Verlag,2011:399-410.
  • 7WANG Xi,CHENG Chuan.Access control using trusted virtual ma-chine based on Xen[C]//Proc of International Conference on AppliedInformatics and Communication.Berlin:Springer-Verlag,2011:94-101.
  • 8SALAUN M.Practical overview of a Xen covert channel[J].Journalin Computer Virology,2010,6(4):317-328.
  • 9PRICE M.The paradox of security in virtual environments[J].Com-puter,2008,41(11):22-28.
  • 10IDC.New IDC IT cloud services survey:top benefits and challenges[EB/OL].(2009-11-15).http://blogs.idc.com/ie/?p=730.

共引文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部