一种安全VM-vTPM迁移协议的设计与实现

被引:2
|
作者
于颖超 [1 ]
刘了 [1 ]
陈左宁 [1 ]
机构
[1] 江南计算技术研究所
关键词
可信计算; 虚拟化; vTPM; 安全VM-vTPM迁移; Xen;
D O I
10.16157/j.issn.0258-7998.2012.04.055
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
在分析现有vTPM迁移方案的基础上提出了安全VM-vTPM迁移的安全需求,并针对这些安全需求,提出了一种新的安全VM-vTPM迁移协议。详细阐述了协议各阶段涉及的具体内容,并对其进行了安全评估。最后,基于Xen讨论了其实现及性能开支。
引用
收藏
页码:130 / 133
页数:4
相关论文
共 6 条
  • [1] TCG software stack specifications V1.2. http://www.trustedcomputing.com/ .
  • [2] Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. Stumpf, F.,Eckert, C. Emerging Security Information, Systems and Technologies, 2008. SECURWARE ’’08. Second International Conference on . 2008
  • [3] Optimizing the migration of virtual computers. Sapuntzakis C,Chandra R,Pfaff B,Chow J,Lam M S,Rosenblum M. Proceedings of the 5th Sym- posium on Operating Systems Design and implementa- tion . 2002
  • [4] vtpm: Virtualizing the trustedplatform module. Berger, S,Cáceres, R,Goldman, K. A,Perez, R,Sailer, R,Doorn, L. USENIX Security . 2006
  • [5] A protocol for property-based attestation. Chen Li-Qun,Landfermann Rainer,et al. Proceedings of the 1st ACM Workshop on Scalable Trusted Computing . 2006
  • [6] When virtual is harder thanreal:security challenges in virtual machine based comput-ing environments. GARFINKEL T,MENDEL R. Proc of the 10th Workshop on HotTopics in Operating Systems . 2005