Trusted code remote execution through trusted computing and virtualization

被引:2
|
作者
Zhang, Liqiang [1 ]
Chen, Lu [1 ]
Zhang, Huanguo [1 ]
Yan, Fei [1 ]
机构
[1] Wuhan Univ, State Key Lab Software Engineer, Comp Sch, Wuhan, Peoples R China
关键词
D O I
10.1109/SNPD.2007.388
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given two machines A and B, A has to commit job codes to be executed on B and get the results back. How can A believe that the job codes are executed correctly on B and related privacy information is not revealed? We propose the attack model and the security goals during the remote execution process. To address this research problem, we propose a new method based on Trusted Computing and Virtualization. We extend trusted computing by providing property-based attestation, job keys generating and migrating securely in TPM. We extend virtualization by using TPM and MAC in hypervisor to isolate job VM. We examine the method to the security goals and it shows that this method can solve the problem effectively.
引用
下载
收藏
页码:39 / +
页数:2
相关论文
共 50 条
  • [21] AN ANONYMOUS REMOTE ATTESTATION FOR TRUSTED CLOUD COMPUTING
    Zhang, Yong
    Li, Xiangxue
    Qian, Haifeng
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 426 - 429
  • [22] An Effective Approach for Remote Attestation in Trusted Computing
    Huang, Xin
    Peng, Yuxing
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 80 - +
  • [23] Threshold remote attestation on trusted cloud computing
    Zhao, Yong
    Xue, Fei
    Zhang, Yanxue
    Journal of Applied Sciences, 2013, 13 (09) : 1592 - 1596
  • [24] A remote anonymous attestation protocol in trusted computing
    Liu, Jiqiang
    Zhao, Jia
    Han, Zhen
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 3688 - 3693
  • [25] Towards remote policy enforcement for runtime protection of mobile code using trusted computing
    Zhang, Xinwen
    Parisi-Presicce, Francesco
    Sandhu, Ravi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 179 - 195
  • [26] Towards remote policy enforcement for runtime protection of mobile code using trusted computing
    George Mason University, Fairfax, VA, United States
    Lect. Notes Comput. Sci., (179-195):
  • [27] Enabling Trusted Data-Intensive Execution in Cloud Computing
    Zhang, Ning
    Lou, Wenjing
    Jiang, Xuxian
    Hou, Y. Thomas
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 355 - 363
  • [28] Task Offloading in Trusted Execution Environment empowered Edge Computing
    Li, Yuepeng
    Zeng, Deze
    Gu, Lin
    Zhu, Andong
    Chen, Quan
    2020 IEEE 26TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2020, : 316 - 323
  • [29] Analysis and Research of Remote Attestation Based on Trusted Computing
    Guo, Jiaming
    Wei, Jiang
    2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 192 - 195
  • [30] Hardware Isolation for Trusted Execution
    Ekberg, Jan-Erik
    PROCEEDINGS OF THE 6TH WORKSHOP ON SECURITY AND PRIVACY IN SMARTPHONES AND MOBILE DEVICES (SPSM'16), 2016, : 1 - 1