DocumentCode
526460
Title
Trusted connection system based on virtual machine architecture
Author
Zhang, Kai ; Song, Ying ; Fang, Hai-feng ; Sun, Yu-zhong
Volume
1
fYear
2010
fDate
9-11 July 2010
Firstpage
192
Lastpage
196
Abstract
With the rapid development of virtualization technology, virtual machine (VM) is widely used by cloud computing - the more and more popular computing paradigm. Thus, in order to guarantee the security of cloud computing, it is necessary to securely identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies on. This paper designs a system of trusted connection based on virtual machine architecture and implements a system prototype. Our system not only can securely measure and identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies on, but also can realize isolations to untrusted VMs. There are three main parts in our system: trusted chain, attestation and isolation. The experiments described in this paper prove that our system ensures trusted connection of VMs and achieves isolations to untrusted VMs. The performance of our system is also analyzed and evaluated. According to the analysis results, our system is practical in terms of performance.
Keywords
Internet; operating system kernels; security of data; virtual machines; cloud computing; software stack; system prototype; trusted connection system; virtual machine architecture; Clouds; Fires; Isolators; Scalability; Variable speed drives; Attestation; Isolation; Trusted Chain; Trusted Connection; Virtual Machine;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location
Chengdu
Print_ISBN
978-1-4244-5537-9
Type
conf
DOI
10.1109/ICCSIT.2010.5564080
Filename
5564080
Link To Document