期刊文献+

面向云计算环境的vTPCM可信管理方案 被引量:1

Research on v TPCM Trust Management Technology for Cloud Computing Environment
下载PDF
导出
摘要 随着云计算技术规模的不断扩大,其安全问题备受人们担忧,面对亟待解决的云计算安全问题,基于TPCM双系统体系结构的可信计算,实现了为云计算平台上的每个虚拟机提供主动免疫可信安全机制,从而防止了云环境下虚拟机化技术相关的安全问题。然而目前针对如何管理vTPCM与虚拟机的生命周期并没有相应的具体方案,因此文章首先提出了管理vTPCM实例的整体架构,旨在解决vTPCM实例与虚拟机生命周期同步;然后,提出了一种基于可信计算的vTPCM管理方案,解决了虚拟机迁移过程中的生命周期同步问题,以及虚拟机访问vTPCM实例与物理机访问TPCM的映射问题,从而有效地提高vTPCM与虚拟机的关联性。 With the continuous expansion of cloud computing technology, its security issues have been worried about. In the face of the urgent need to solve the cloud computing security issues, the Trusted Computing TPCM-based dual-system architecture enables the provision of proactive immune trusted security mechanisms for each virtual machine on the cloud computing platform, thus preventing the cloud environment virtual machine technology-related security issues. However, this paper first puts forward the overall architecture of managing v TPCM instances, which aims at solving the management of the lifecycle of v TPCM instance and virtual machine. Then, the paper analyzes the v TPCM instance and the virtual machine lifecycle, This paper proposes a management scheme based on Trusted Computing to solve the problem of lifecycle synchronization in virtual machine migration process and the mapping between virtual machine accesses v TPCM instance and physical machine access TPCM, so as to effectively improve the association between v TPCM and virtual machine.
作者 张建标 杨石松 涂山山 王晓 ZHANG Jianbiao;YANG Shisong;TU Shanshan;WANG Xiao(Beijing Key Laboratory of Trusted Computing, Faculty of Information Technology, Beijing University of Technology, Beijing 100124;National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing 100142, China)
出处 《信息网络安全》 CSCD 北大核心 2018年第4期9-14,共6页 Netinfo Security
基金 国家自然科学基金[61671030] 国家高技术研究发展计划(863计划)[2015AA016002]
关键词 云计算 可信计算 vTPCM管理 虚拟机迁移 强关联性 cloud computing trusted computing vTPCM management VM migration strong association
  • 相关文献

参考文献5

二级参考文献30

  • 1岳芳.网络安全的标准与组织[J].网络安全技术与应用,2004(5):74-75. 被引量:3
  • 2陈光,匡兴华.信息系统安全风险评估研究[J].网络安全技术与应用,2004(7):62-64. 被引量:12
  • 3李杨,聂晓伟,杨鼎才.基于BS7799标准风险评估实施性研究[J].计算机应用研究,2005,22(7):42-44. 被引量:5
  • 4孙鹏鹏,张玉清,韩臻.信息安全风险评估工具的设计与实现[J].计算机工程与应用,2007,43(9):95-98. 被引量:12
  • 5Sabai A, Waters B. Fuzzy identity-based encryption [ A]. Pro- ceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques [ C ]. Berlin Heidelberg: Springer,2005.457 - 473.
  • 6Goyal Pandey O, Sabai A, et al. Attribute based encryption for" fine-grained access control of encrypted data [ A]. Proceedings of ACM Conference on Computer and Communications Securi- ty [ C] .Alexandria, Virginia, USA: ACM,2006.89 - 98.
  • 7Bethencourt J, Sahai A, Waters B. Ciphertext-policy aUribute- based encryption [ A]. IEEE Symposium on Security and Priva- cy( SP' 07) [ C ]. Berkeley, California, USA: IEEE, 2007.321 - 334.
  • 8Melissa Chase. Multi-authorityattribute based encryption [ A ]. Proceedings of the 4th Theory of Cryptography Conference L C]. Berlin Heidelberg: Springer, 2007.515 - 534.
  • 9Wang G, Liu Q, Wu J. Hierarchical attribute-based encryption for fine-grained access control in cloud storage services E A]. Proceedings of ACM CCS Computer and Communications Se- curity [C].New York,USA:ACM,2010.735- 737.
  • 10Bobba R, Khurana H, Prabhakaran M. Attribute-sets: A practi- cally motivated enhancement to auribute-based encryption [ A ]. Proceedings of ESORICS [ C ]. Berlin Heidelberg: Springer, 2009.587 - 604.

共引文献175

同被引文献10

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部