检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:FAN Peiru ZHAO Bo SHI Yuan CHEN Zhihong NI Mingtao
出 处:《Wuhan University Journal of Natural Sciences》2015年第6期512-520,共9页武汉大学学报(自然科学英文版)
基 金:Supported by the National Basic Research Program of China(973 Program)(2014CB340600);the National High Technology Research and Development Program of China(863 Program)(2015AA016002);the National Natural Science Foundation of China(61173138,61272452,61332018)
摘 要:To prevent malicious virtual machine from harming the security of vTPM-VM live migration process, we propose an im- proved vTPM-VM live migration protocol which uses a TPM-based integrity verification policy and a specific encryption scheme to enhance security. The TPM-based integrity verification policy is presented to ensure that all participating entities in this process are trustworthy. In data transfer phase, the specific encryp- tion scheme is designed to associate the decipher process with one certain platform status so that only the destination platform can gain the key data of the migrated VM and vTPM instance. The security of this new protocol is analyzed. The results show that this protocol can effectively resist most of the attacks in the proc- ess ofvTPM-VM live migration.To prevent malicious virtual machine from harming the security of vTPM-VM live migration process, we propose an im- proved vTPM-VM live migration protocol which uses a TPM-based integrity verification policy and a specific encryption scheme to enhance security. The TPM-based integrity verification policy is presented to ensure that all participating entities in this process are trustworthy. In data transfer phase, the specific encryp- tion scheme is designed to associate the decipher process with one certain platform status so that only the destination platform can gain the key data of the migrated VM and vTPM instance. The security of this new protocol is analyzed. The results show that this protocol can effectively resist most of the attacks in the proc- ess ofvTPM-VM live migration.
关 键 词:1007-1202(2015)06-0512-09 trusted computing vTPM virtual machines live migration
分 类 号:TP309.2[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.211