Trusted code remote execution through trusted computing and virtualization

被引:2
|
作者
Zhang, Liqiang [1 ]
Chen, Lu [1 ]
Zhang, Huanguo [1 ]
Yan, Fei [1 ]
机构
[1] Wuhan Univ, State Key Lab Software Engineer, Comp Sch, Wuhan, Peoples R China
关键词
D O I
10.1109/SNPD.2007.388
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given two machines A and B, A has to commit job codes to be executed on B and get the results back. How can A believe that the job codes are executed correctly on B and related privacy information is not revealed? We propose the attack model and the security goals during the remote execution process. To address this research problem, we propose a new method based on Trusted Computing and Virtualization. We extend trusted computing by providing property-based attestation, job keys generating and migrating securely in TPM. We extend virtualization by using TPM and MAC in hypervisor to isolate job VM. We examine the method to the security goals and it shows that this method can solve the problem effectively.
引用
下载
收藏
页码:39 / +
页数:2
相关论文
共 50 条
  • [41] Trusted computing for infrastructure
    1600, Telefonaktiebolaget L.M. Ericsson (91):
  • [42] Modeling Trusted Computing
    CHEN Shuyi
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1507 - 1510
  • [43] Trusted computing, or the gatekeeper
    Kursawe, K
    Wolf, C
    INFORMATION SOCIETY: EMERGING LANDSCAPES, 2006, 195 : 339 - +
  • [44] Trusted computing and communications
    Wang, Guojun
    Yang, Laurence T.
    Sakurai, Kouichi
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (01) : 1 - 2
  • [45] Challenges for Trusted Computing
    Balfe, Shane
    Gallery, Eimear
    Mitchell, Chris J.
    Paterson, Kenneth G.
    IEEE SECURITY & PRIVACY, 2008, 6 (06) : 60 - 66
  • [46] Pairings in Trusted Computing
    Chen, Liqun
    Morrissey, Paul
    Smart, Nigel P.
    PAIRING-BASED CRYPTOGRAPHY - PAIRING 2008, 2008, 5209 : 1 - +
  • [47] TRUSTED COMPUTING UPDATE
    ABRAMS, MD
    JOYCE, MV
    COMPUTERS & SECURITY, 1995, 14 (01) : 57 - 68
  • [48] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206
  • [49] Enhancing the Privacy of Network Services through Trusted Computing
    Zhang, Denghui
    Ren, Lijing
    Gu, Zhaoquan
    APPLIED SCIENCES-BASEL, 2022, 12 (18):
  • [50] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    Wuhan University Journal of Natural Sciences, 2007, (01) : 13 - 16