Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing

来源 :第十二届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:SOMNUS1
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  As the foundation component of cloud computing platform,the virtual machine(VM)is confronted with numerous security threats.However,existing solutions tend to focus on solving the threat in a specific state of VM.In this paper,we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats of VM in the entire lifecycle.Specifically,a concept of VM lifecycle is presented by dividing the different active conditions of the VM.Then,a trusted-computing-based security protection framework is further developed,which can extend the trusted relationship from trusted platform module to VM and protect the security and reliability of VM in the lifecycle.The theoretical analysis shows that our proposed framework can provide comprehensive safety to VM in lifecycle.Furthermore,the experiment results are provided to demonstrate that the proposed framework is feasible and archives a higher level of security compared with some state-of-the-art schemes.
其他文献
  随着Apple iPhoneX的发布,智能手机中摄像头 表现为更多的模式:深摄,双摄、三摄、单摄、IR 等,这为计算机枧觉、计算机图形学、各类AI箅法 的研究和技术落地提供了更广阔的空
会议
  传统的计算机图形基于数学表达或交互设计形成 图形的描述,接下来的图形处理主要基于图形的基 本元素及其几何属性,而对图形所描述物体或场景的结构语义以及物理、功能、社
会议
  We introduce an approach to quadrilateral meshing of arbitrary triangulated surfaces that combines the theoretical guarantees of Morse-based approaches with
会议
  本报告以目前最流行的无人驾驶为例,阐述图形 学在人工智能中的应用及地位,报告从无人驾驶的 关鍵三部分-感知、决策及控制-讲述了计算机图形 学在此可以发挥的关键作用,而V
会议
  The security of SPECK under impossible differential cryptanalysis is studied.Based on multiple 6-round impossible differential distinguishers and combined w
  基于位置的数据服务在为用户提供生活便利的同时,不可信第三方无边界地采集个人位置、轨迹模式等信息,进行位置行为关联等分析行为存在着巨大的隐私泄露风险。针对位置数据
  Although the medical monitoring system has massive users,each of them only possesses one piece of data logging that participates in statistical computing.If
  We present an automatic algorithm for subtractive manufacturing of free form 3D objects using high-speed CNC machining.
会议
  目前,僵尸网络检测方法大多依靠对僵尸网络通信活动或通信内容的分析,前者对数据流的特征 进行统计分析,不涉及数据流中的内容,在检测加密类型方面具有较强优势,但准确性较低;
  Variety of security issues exist while all-optical networks provide high-speed transmission,therefore effective means and strategies are needed to repair fa