期刊文献+

Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing 被引量:4

Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
原文传递
导出
摘要 As a foundation component of cloud computing platforms, Virtual Machines (VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM. In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. Specifically, a concept of the VM lifecycle is presented divided up by the different active conditions of the VM. Then, a trusted computing based security protecti on framework is developed, which can exte nd the trusted relati on ship from trusted platform module to the VM and protect the security and reliability of the VM throughout its lifecycle. The theoretical analysis shows that our proposed framework can provide comprehensive safety to VM in all of its states. Furthermore, experiment results demonstrate that the proposed framework is feasible and achieves a higher level of security compared with some state-of-the-art schemes. As a foundation component of cloud computing platforms, Virtual Machines(VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM. In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. Specifically, a concept of the VM lifecycle is presented divided up by the different active conditions of the VM. Then, a trusted computing based security protection framework is developed, which can extend the trusted relationship from trusted platform module to the VM and protect the security and reliability of the VM throughout its lifecycle. The theoretical analysis shows that our proposed framework can provide comprehensive safety to VM in all of its states. Furthermore, experiment results demonstrate that the proposed framework is feasible and achieves a higher level of security compared with some state-of-the-art schemes.
出处 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第5期520-534,共15页 清华大学学报(自然科学版(英文版)
基金 supported by the National Natural Science Foundation of China(Nos.61802270 and 61802271) the Fundamental Research Funds for the Central Universities(Nos.SCU2018D018 and SCU2018D022)
关键词 VIRTUAL TRUSTED computing VIRTUAL machine LIFECYCLE TRUSTED CHAIN security measurement state monitoring virtual trusted computing virtual machine lifecycle trusted chain security measurement state monitoring
作者简介 Xin Jin,E-mail:xinjin_cn@ 163.com;Xin Jin is a PhD candidate at Sichuan University. He received the BEng degree from Liaoning Shihua University in 1999 and the MS degree from Chongqing University in 2006. His research interests in elude trusted computing, virtuaization secutity, and cloud computing security;Qixu Wang,E-mail:qixuwang@scu.edu.cn,To whom conespondence should be addressed.Qixu Wang is currently an assistant researcher in the College of Cybersecurity at Sichuan University. He received the BS degree from Southwest University of Science and Technology in 2009, and the PhD degree from University of Electronic Science and Technology of China in 2017. His cuiTent research interests include cloud computing security, wireless network security, data privacy protection, and trusted computing;Xiang Li,E-mail:2016323040026@stu.scu.edu.cn;Xiang Li is a PhD candidate at Sichuan University. He received the BS degree from Hainan University in 2009 and the MS degree from Chongqing University of Posts and Telecommunications in 2012. His research interests in elude information security, cloud computing security, and cloud service assessment;Xingshu Chen,E-mail:chenxsh@scu.edu.cn.Xingshu Chen received the PhD degree from Sichuan University in 2004. She is now a professor of the College of Computer Science and Cybersecurity Research Institute at Sichuan University. She is the member of China Information Security Standardization Technical Committee. Her research interests include cloud computing, cloud security, distributed tile system, big data processing, network protocol analysis, and new media supervision;Wei Wang,E-mail:15762254497 @ 139.com.Wei Wang is currently a master student in the College of Computer Scienee of Sichuan University. He received the bachelor degree from Sichuan University in 2016. His current research focuses on trusted computing virtualization technology in cloud computing.
  • 相关文献

参考文献4

二级参考文献42

  • 1王因传,杨林,孙伟峰.IBM vTPM的Xen实现研究[J].军事通信技术,2010,31(3):67-71. 被引量:6
  • 2P. T. Endo, A. V. de Almeida Palhares, N. N. Pereira, G. E. Goncalves, D. Sadok, J. Kelner, B. Melander, and J. E. Mangs, Resource allocation for distributed cloud: Concepts and research challenges, Network, IEEE, vol. 25, no. 4, pp. 42-46, 2011.
  • 3X. Lu, H. Wang, 1. Wang, 1. Xu, and D. Li, Internet-based virtual computing environment: Beyond the data center as a computer, Future Generation Computer Systems, vol. 29, no. 1, pp. 309-322,2013.
  • 4C. J. Rathod, A survey on different virtual machine placement algorithms, International Journal of Advance Research in Computer Science and Management Studies, vol. 2, no. 2,pp. 266-271, 2014.
  • 5M. Alicherry and T. Lakshman, Network aware resource allocation in distributed clouds, in INFO COM, 2012 Proceedings IEEE, 2012, pp. 963-971.
  • 6W. Chen, J. Cao, and Y. Wan, QoS-aware virtual machine scheduling for video streaming services in multi-cloud, Tsinghua Science and Technology, vol. 18, no. 3, pp. 308- 317,2013.
  • 7M. Li, A. Lukyanenko, S. Tarkoma, and A. Yla-Jaaski, Mptcp incast in data center networks, Communications, China, vol. 11, no. 4, pp. 25-37, 2014.
  • 8A. Greenberg, J. R. Hamilton, N. Jain, S. Kandula, C. Kim, P. Lahiri, D. A. Maltz, P. Patel, and S. Sengupta, V12: A scalable and flexible data center network, ACM SIGCOMM Computer Communication Review, vol. 39, pp. 51-62, 2009.
  • 9M. AI-Fares, A. Loukissas, and A. Vahdat, A scalable, commodity data center network architecture, ACM SIGCOMM Computer Communication Review, vol. 38, pp. 63-74, 2008.
  • 10S. Martello and P. Toth, Heuristic algorithms for the multiple knapsack problem, Computing, vol. 27, no. 2, pp. 93-112, 1981.

共引文献19

同被引文献25

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部