T-VMI: Trusted Virtual Machine Introspection in Cloud Environments

被引:9
|
作者
Jia, Lina [1 ]
Zhu, Min [1 ]
Tu, Bibo [1 ]
机构
[1] Univ Chinese Acad Sci, Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
关键词
Trusted VMI; TrustZone; Semantic Gap;
D O I
10.1109/CCGRID.2017.48
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, the vulnerability of cloud environment exposed in security places Virtual Machine Introspection(VMI) at risk: once attackers subvert any layers of cloud environment, such as host, virtual machine manager(VMM) or qemu, VMI will be exposed undoubtedly to those attackers too. Nearly all existing VMI techniques implicitly assume that both VMM by which VMI accesses specific VM data and host which VMI is running on, are nonmalicious and immutable. Unfortunately, this assumption can be potentially violated with the growing shortage of security in cloud environment. Once VMM or host is exploited, attackers can tamper the code or hijack the data of VMI, then, falsify VM information and certifications to Cloud system's administrators who try to make sure the security of specific VM in certain compute node. This paper proposes a new trusted VMI monitor frame: T-VMI, which can avoid the malicious subversion of the routine of VMI. T-VMI guarantees the integrity of VMI code using isolation and the correctness of VMI data using high privilege level instruction and appropriate trap mechanism. This model is evaluated on a simulation environment by using ARM Foundation Model 8.0 and has been presented on a real development ARMv8 JUNO-r0 board. We finished the comprehensive experiments including effectiveness and performance, and the result and analysis show T-VMI has achieved the aim of expected effectiveness with acceptable performance cost.
引用
收藏
页码:478 / 487
页数:10
相关论文
共 50 条
  • [41] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 13 - 16
  • [42] Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing
    Songzhu Mei
    Zhiying Wang
    Yong Cheng
    Jiangchun Ren
    Jiangjiang Wu
    Jie Zhou
    International Journal of Computational Intelligence Systems, 2012, 5 : 924 - 932
  • [43] Predicted Affinity Based Virtual Machine Placement in Cloud Computing Environments
    Fu, Xiong
    Zhou, Chen
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (01) : 246 - 255
  • [44] Metaheuristics algorithms for virtual machine placement in cloud computing environments—a review
    Gabhane J.P.
    Pathak S.
    Thakare N.M.
    Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 329 - 349
  • [45] Correlation-based virtual machine migration in dynamic cloud environments
    Liu Liu
    Shaoping Zheng
    Hongfang Yu
    Vishal Anand
    Du Xu
    Photonic Network Communications, 2016, 31 : 206 - 216
  • [46] Virtual machine provisioning through satellite communications in federated Cloud environments
    Celesti, Antonio
    Fazio, Maria
    Villari, Massimo
    Puliafito, Antonio
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2012, 28 (01): : 85 - 93
  • [47] Correlation-based virtual machine migration in dynamic cloud environments
    Liu, Liu
    Zheng, Shaoping
    Yu, Hongfang
    Anand, Vishal
    Xu, Du
    PHOTONIC NETWORK COMMUNICATIONS, 2016, 31 (02) : 206 - 216
  • [48] A Deep Investigation Into Network Performance in Virtual Machine Based Cloud Environments
    Shea, Ryan
    Wang, Feng
    Wang, Haiyang
    Liu, Jiangchuan
    2014 PROCEEDINGS IEEE INFOCOM, 2014, : 1285 - 1293
  • [49] Approaches for optimizing virtual machine placement and migration in cloud environments: A survey
    Silva Filho, Manoel C.
    Monteiro, Claudio C.
    Inacio, Pedro R. M.
    Freire, Mario M.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2018, 111 : 222 - 250
  • [50] Virtual machine power measuring technique with bounded error in cloud environments
    Xiao, Peng
    Hu, Zhigang
    Liu, Dongbo
    Yan, Guofeng
    Qu, Xilong
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 818 - 828