In the cloud computing environment,with the complex network environment,the virtualization platform faces many security problems.At the same time,trusted computing can greatly enhance the architecture security of virt...In the cloud computing environment,with the complex network environment,the virtualization platform faces many security problems.At the same time,trusted computing can greatly enhance the architecture security of virtualization platform systems,but there are many problems when trusted computing is deployed directly in the cloud environment.Therefore,this paper proposes a trusted virtual machine model based on high-performance cipher coprocessor to solve the security problems such as the isolation and insufficient performance of virtual TPM(vTPM)on the existing virtual platform.In this model,virtio technology was used to realize the virtualization of TPM,and a management architecture was designed to manage the life cycle of vTPM.The analysis shows that the model can complete the isolation of vTPM,and protect the security of vTPM during the migration process through the migration control server,and can strengthen the security of the virtualization platform.Finally,the simulation results show that the model is more feasible and suitable for cloud platform than hardware TPM.展开更多
文摘In the cloud computing environment,with the complex network environment,the virtualization platform faces many security problems.At the same time,trusted computing can greatly enhance the architecture security of virtualization platform systems,but there are many problems when trusted computing is deployed directly in the cloud environment.Therefore,this paper proposes a trusted virtual machine model based on high-performance cipher coprocessor to solve the security problems such as the isolation and insufficient performance of virtual TPM(vTPM)on the existing virtual platform.In this model,virtio technology was used to realize the virtualization of TPM,and a management architecture was designed to manage the life cycle of vTPM.The analysis shows that the model can complete the isolation of vTPM,and protect the security of vTPM during the migration process through the migration control server,and can strengthen the security of the virtualization platform.Finally,the simulation results show that the model is more feasible and suitable for cloud platform than hardware TPM.