摘要
As a foundation component of cloud computing platforms, Virtual Machines (VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM. In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. Specifically, a concept of the VM lifecycle is presented divided up by the different active conditions of the VM. Then, a trusted computing based security protecti on framework is developed, which can exte nd the trusted relati on ship from trusted platform module to the VM and protect the security and reliability of the VM throughout its lifecycle. The theoretical analysis shows that our proposed framework can provide comprehensive safety to VM in all of its states. Furthermore, experiment results demonstrate that the proposed framework is feasible and achieves a higher level of security compared with some state-of-the-art schemes.
As a foundation component of cloud computing platforms, Virtual Machines(VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM. In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. Specifically, a concept of the VM lifecycle is presented divided up by the different active conditions of the VM. Then, a trusted computing based security protection framework is developed, which can extend the trusted relationship from trusted platform module to the VM and protect the security and reliability of the VM throughout its lifecycle. The theoretical analysis shows that our proposed framework can provide comprehensive safety to VM in all of its states. Furthermore, experiment results demonstrate that the proposed framework is feasible and achieves a higher level of security compared with some state-of-the-art schemes.
基金
supported by the National Natural Science Foundation of China(Nos.61802270 and 61802271)
the Fundamental Research Funds for the Central Universities(Nos.SCU2018D018 and SCU2018D022)
作者简介
Xin Jin,E-mail:xinjin_cn@ 163.com;Xin Jin is a PhD candidate at Sichuan University. He received the BEng degree from Liaoning Shihua University in 1999 and the MS degree from Chongqing University in 2006. His research interests in elude trusted computing, virtuaization secutity, and cloud computing security;Qixu Wang,E-mail:qixuwang@scu.edu.cn,To whom conespondence should be addressed.Qixu Wang is currently an assistant researcher in the College of Cybersecurity at Sichuan University. He received the BS degree from Southwest University of Science and Technology in 2009, and the PhD degree from University of Electronic Science and Technology of China in 2017. His cuiTent research interests include cloud computing security, wireless network security, data privacy protection, and trusted computing;Xiang Li,E-mail:2016323040026@stu.scu.edu.cn;Xiang Li is a PhD candidate at Sichuan University. He received the BS degree from Hainan University in 2009 and the MS degree from Chongqing University of Posts and Telecommunications in 2012. His research interests in elude information security, cloud computing security, and cloud service assessment;Xingshu Chen,E-mail:chenxsh@scu.edu.cn.Xingshu Chen received the PhD degree from Sichuan University in 2004. She is now a professor of the College of Computer Science and Cybersecurity Research Institute at Sichuan University. She is the member of China Information Security Standardization Technical Committee. Her research interests include cloud computing, cloud security, distributed tile system, big data processing, network protocol analysis, and new media supervision;Wei Wang,E-mail:15762254497 @ 139.com.Wei Wang is currently a master student in the College of Computer Scienee of Sichuan University. He received the bachelor degree from Sichuan University in 2016. His current research focuses on trusted computing virtualization technology in cloud computing.