期刊文献+

一种支持多域访问的可信云终端设计 被引量:2

Design of trusted cloud terminal supporting multi-domain access
原文传递
导出
摘要 为了通过单台物理终端同时运行不同安全等级业务系统、多域访问不同安全等级云服务,综合利用虚拟机技术和可信计算技术,提出了一种可信云计算环境下的多域访问终端解决方案.该方案通过可信密码模块(TCM)虚拟化和信任链传递机制实现可信环境的构建,利用Hypervisor多级安全访问控制框架和多域通信管理保证多级安全云服务的隔离和多域并发访问.实验结果表明:该方案是可行和有效的,可以为多域访问提供基础平台的支撑,同时可信机制给系统带来的性能损耗相对较小,可以满足实际应用过程中的性能需求. As trusted cloud computing environment is a logical isolation of multi-domain environment,through a single physical terminal running different security level application systems to multi-domain access different security level cloud services at the same time has an urgent need.Based on the virtual machine technology and trusted computing technology,a multi-domain access terminal solution for trusted cloud computing environment was proposed.TCM(trusted cryptography module)virtualization and trust chain transfer mechanism were used to construct a trusted terminal environment,and the hypervisor′s multi-level security access control framework and the multi-domain communication management were used to assure the isolation of multi-level security cloud service and multi-domain concurrent access.Experimental result shows that the scheme is feasible and effective,which can provide a basic platform support for multi-domain access,and the performance cost of trusted mechanism is relatively small,which can meet the performance requirements in the process of actual application.
作者 段翼真 刘忠 施展 Duan Yizhen;Liu Zhong;Shi Zhan(Chengdu Institute of Computer Application, Chinese Academy of Sciences, Chengdu 610041, China;University of Chinese Academy of Sciences, Beijing 100049, China;School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China)
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第12期32-38,共7页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 国防基础科研项目(B0420132604)
关键词 可信云 多域访问 多级安全 可信密码模块(TCM)虚拟化 信任链 trusted cloud multi-domain access multi-level security TCM (trusted cryptographymodule) virtualization trust chain
  • 相关文献

参考文献3

二级参考文献22

  • 1李晓勇,沈昌祥.一个动态可信应用传递模型的研究[J].华中科技大学学报(自然科学版),2005,33(z1):310-312. 被引量:14
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3Vaughan-Nichols S J. How trustworthy is trusted computing[J]. IEEE Computer, 2003, 36(3) : 18 - 20.
  • 4Algridas A, Laprie J C, Brian R, et al. Basic concepts and taxonomy of dependable and secure computing[J]. IEEE Trans. on Dependable and Secure Computing, 2004, 1(1): 11 - 33.
  • 5Lampson P, Manferdelli B, WiUam J. A trusted open platform[J]. IEEE Computer, 2003, 36(7):55- 62.
  • 6Pandora E. Spyware, adware, autoexecution, and NGSCB[J]. Computer Security, 2003, (5) :366 - 377.
  • 7Dornan A. Trusted computing architectures[J]. Network Magazine, 2005, 20(7) :53 - 55.
  • 8GARFINKEL T,PFAFF B,CHOW J. Terra:A Virtual Machinebased Platform for Trusted Computing[A].Bolton Landing,New York,USA,2003.
  • 9林宝如,张帆,陈怡.嵌入式计算机系统的USB主机驱动分析[J].重庆大学学报(自然科学版),2008,31(3):324-327. 被引量:3
  • 10张兴,沈昌祥.一种新的可信平台控制模块设计方案[J].武汉大学学报(信息科学版),2008,33(10):1011-1014. 被引量:17

共引文献77

同被引文献18

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部