T-VMI: Trusted Virtual Machine Introspection in Cloud Environments

被引:9
|
作者
Jia, Lina [1 ]
Zhu, Min [1 ]
Tu, Bibo [1 ]
机构
[1] Univ Chinese Acad Sci, Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Trusted VMI; TrustZone; Semantic Gap;
D O I
10.1109/CCGRID.2017.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the vulnerability of cloud environment exposed in security places Virtual Machine Introspection(VMI) at risk: once attackers subvert any layers of cloud environment, such as host, virtual machine manager(VMM) or qemu, VMI will be exposed undoubtedly to those attackers too. Nearly all existing VMI techniques implicitly assume that both VMM by which VMI accesses specific VM data and host which VMI is running on, are nonmalicious and immutable. Unfortunately, this assumption can be potentially violated with the growing shortage of security in cloud environment. Once VMM or host is exploited, attackers can tamper the code or hijack the data of VMI, then, falsify VM information and certifications to Cloud system's administrators who try to make sure the security of specific VM in certain compute node. This paper proposes a new trusted VMI monitor frame: T-VMI, which can avoid the malicious subversion of the routine of VMI. T-VMI guarantees the integrity of VMI code using isolation and the correctness of VMI data using high privilege level instruction and appropriate trap mechanism. This model is evaluated on a simulation environment by using ARM Foundation Model 8.0 and has been presented on a real development ARMv8 JUNO-r0 board. We finished the comprehensive experiments including effectiveness and performance, and the result and analysis show T-VMI has achieved the aim of expected effectiveness with acceptable performance cost.
引用
收藏
页码:478 / 487
页数:10
相关论文
共 50 条
  • [31] Elastic virtual machine placement in cloud computing network environments
    Kavvadia, Eleni
    Sagiadinos, Spyros
    Oikonomou, Konstantinos
    Tsioutsiouliklis, Giorgos
    Aissa, Sonia
    COMPUTER NETWORKS, 2015, 93 : 435 - 447
  • [32] Virtual machine placement mechanisms in the cloud environments: a systematic review
    Zhuang, Haiyan
    Ghouchani, Babak Esmaeilpour
    KYBERNETES, 2021, 50 (02) : 333 - 368
  • [33] Update checker: increasing virtual machine security in cloud environments
    Raghavendran, R.
    Ragupathi, B.
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1268 - 1273
  • [34] A Fuzzy Virtual Machine Workload Prediction Method for Cloud Environments
    Ramezani, Fahimeh
    Naderpour, Mohsen
    2017 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE), 2017,
  • [35] Minimizing virtual machine migration probability in cloud computing environments
    Marjan Jalali Moghaddam
    Akram Esmaeilzadeh
    Mina Ghavipour
    Ahmad Khadem Zadeh
    Cluster Computing, 2020, 23 : 3029 - 3038
  • [36] Workload Generation for Virtual Machine Placement in Cloud Computing Environments
    Ortigoza, Jammily
    Lopez-Pires, Fabio
    Baran, Benjamin
    PROCEEDINGS OF THE 2016 XLII LATIN AMERICAN COMPUTING CONFERENCE (CLEI), 2016,
  • [37] Prediction Model for Virtual Machine Power Consumption in Cloud Environments
    Veni, T.
    Bhanu, S. Mary Saira
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 122 - 127
  • [38] A Universal Semantic Bridge for Virtual Machine Introspection
    Schneider, Christian
    Pfoh, Jonas
    Eckert, Claudia
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 370 - 373
  • [39] Narrowing the semantic gap in virtual machine introspection
    Cui, Chao-Yuan
    Wu, Yun
    Li, Ping
    Zhang, Xiao-Ming
    Tongxin Xuebao/Journal on Communications, 2015, 36 (08):
  • [40] Efficient Checkpointing of Virtual Machines using Virtual Machine Introspection
    Aderholdt, Ferrol
    Han, Fang
    Scott, Stephen L.
    Naughton, Thomas
    2014 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2014, : 414 - 423