全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

虚拟可信平台层次化安全体系结构设计

Keywords: 虚拟化,可信计算,安全体系结构,虚拟机监控器

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对虚拟化技术给计算平台带来的一些新的安全问题,提出一种以虚拟机应用安全为核心的虚拟可信计算平台安全体系结构,为计算平台建立一种层次化的可信计算基(TCB):由硬件信任根TPM/TCM支持、可信虚拟机监控器(TVMM)以及安全管理器(SM)由底至上3个层次共同组成.基于开源XEN,设计了一种可保证虚拟机(VMs)及其应用安全的虚拟可信平台实例,它支持远程证实、信息流控制、安全迁移和私密性保护等安全机制.分析结果表明,实例系统可灵活支持其上虚拟机应用实现不同安全目标.

References

[1]  Trusted Computing Group.TPM Main Specification Level 2 Version 1.2,Revision 103[EB/OL].(2007-07-09)[2007-07-09].http:∥www.trustedcomputinggroup.org/resources/tpm_main_specification
[2]  中国国家密码管理局.可信计算密码支撑平台功能与接口与规范[EB/OL].(2007-12-29)[2007-12-29].http:∥www.oscca.gov.cn/Doc/6/News_1132.htm.State Password Administration Committee in China.Functionality and interface specification of cryptographic support platformfor trusted computing[EB/OL].(2007-12-29)[2007-12-29].http:∥www.oscca.gov.cn/Doc/6/News_1132.htm.(inChinese)
[3]  STUMPF F,BENZ M,HERMANOWSKI M,et al.An approach to a trustworthy system architecture using virtualization[C]∥Proc.of the 4th International conference on Autonomic and Trusted Computing.Heidelberg:Springer-Verlag,2007:191-202.
[4]  GARFINKEL T,PFAFF B,CHOW J,et al.Terra:a virtual machine-based platform for trusted computing[C]∥Proc.of19th ACM Symposium on Operating Systems Principles,SOSP 2003.New York,NY:ACM Press,2003:193-206.
[5]  SAILER R,JAEGER T,VALDEZ E,et al.Building a MAC-based security architecture for the XEN open-source hypervisor[C]∥Proc.of the 21st Annual Computer Security Applications Conference.Washington,DC:IEEE Computer Society,2005:276-285.
[6]  KUHLMANND,LANDFERMANNR,RAMASAMY H,et al.An open trusted computing architecture-secure virtual machinesenabling user-defined policy enforcement[EB/OL].Washington,DC:IBM Research Division,(2006-06-28)[2006-08-21].http:∥domino.watson.ibm.com/library/cyberdig.nsf/papers/7024C307EA0DFAEE852571D0003B10F3/$File/rz3655.pdf
[7]  GARFINKEL T,MENDEL R.When virtual is harder than real:Security challenges in virtual machine based computingenvironments[C]∥Proc.of the 10th Workshop on Hot Topics in Operating Systems.Berkeley,CA:USENIX Association,2005:210-217.
[8]  SAILER R,ZHANG X,JAEGER T,et al.Design and implementation of a TCG-based integrity measurement architecture[C]∥Proc.of the 13th USENIX Security Symposium.Berkeley,CA:USENIX Association,2004:223-238.
[9]  MURRAY D,MILOS G,HAND S.Improving XEN security through disaggregation[C]∥Proc.of the 4th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments.New York,NY:ACM press,2008:151-160.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133