Secure Virtual Machine Execution under an Untrusted Management OS

Chunxiao Li, A. Raghunathan, N. Jha
{"title":"Secure Virtual Machine Execution under an Untrusted Management OS","authors":"Chunxiao Li, A. Raghunathan, N. Jha","doi":"10.1109/CLOUD.2010.29","DOIUrl":null,"url":null,"abstract":"Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including improved resource utilization, software portability, and reliability. For security-critical applications, it is highly desirable to have a small trusted computing base (TCB), since it minimizes the surface of attacks that could jeopardize the security of the entire system. In traditional virtualization architectures, the TCB for an application includes not only the hardware and the virtual machine monitor (VMM), but also the whole management operating system (OS) that contains the device drivers and virtual machine (VM) management functionality. For many applications, it is not acceptable to trust this management OS, due to its large code base and abundance of vulnerabilities. In this paper, we address the problem of providing a secure execution environment on a virtualized computing platform under the assumption of an untrusted management OS. We propose a secure virtualization architecture that provides a secure run-time environment, network interface, and secondary storage for a guest VM. The proposed architecture significantly reduces the TCB of security-critical guest VMs, leading to improved security in an untrusted management environment. We have implemented a prototype of the proposed approach using the Xen virtualization system, and demonstrated how it can be used to facilitate secure remote computing services. We evaluate the performance penalties incurred by the proposed architecture, and demonstrate that the penalties are minimal.","PeriodicalId":375404,"journal":{"name":"2010 IEEE 3rd International Conference on Cloud Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"90","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE 3rd International Conference on Cloud Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CLOUD.2010.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 90

Abstract

Virtualization is a rapidly evolving technology that can be used to provide a range of benefits to computing systems, including improved resource utilization, software portability, and reliability. For security-critical applications, it is highly desirable to have a small trusted computing base (TCB), since it minimizes the surface of attacks that could jeopardize the security of the entire system. In traditional virtualization architectures, the TCB for an application includes not only the hardware and the virtual machine monitor (VMM), but also the whole management operating system (OS) that contains the device drivers and virtual machine (VM) management functionality. For many applications, it is not acceptable to trust this management OS, due to its large code base and abundance of vulnerabilities. In this paper, we address the problem of providing a secure execution environment on a virtualized computing platform under the assumption of an untrusted management OS. We propose a secure virtualization architecture that provides a secure run-time environment, network interface, and secondary storage for a guest VM. The proposed architecture significantly reduces the TCB of security-critical guest VMs, leading to improved security in an untrusted management environment. We have implemented a prototype of the proposed approach using the Xen virtualization system, and demonstrated how it can be used to facilitate secure remote computing services. We evaluate the performance penalties incurred by the proposed architecture, and demonstrate that the penalties are minimal.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
在不受信任的管理操作系统下安全执行虚拟机
虚拟化是一种快速发展的技术,可用于为计算系统提供一系列好处,包括改进资源利用率、软件可移植性和可靠性。对于安全关键型应用程序,非常希望有一个小的可信计算基础(TCB),因为它可以最大限度地减少可能危及整个系统安全性的攻击。在传统的虚拟化体系结构中,应用程序的TCB不仅包括硬件和虚拟机监视器(VMM),还包括包含设备驱动程序和虚拟机管理功能的整个管理操作系统(OS)。对于许多应用程序来说,信任这个管理操作系统是不可接受的,因为它有大量的代码库和大量的漏洞。在本文中,我们解决了在不可信管理操作系统的假设下,在虚拟化计算平台上提供安全执行环境的问题。我们提出了一种安全的虚拟化体系结构,它为来宾虚拟机提供安全的运行时环境、网络接口和二级存储。所提出的架构显著降低了对安全至关重要的来宾虚拟机的TCB,从而在不可信的管理环境中提高了安全性。我们已经使用Xen虚拟化系统实现了所建议方法的原型,并演示了如何使用它来促进安全的远程计算服务。我们评估了所提议的体系结构所带来的性能损失,并证明这些损失是最小的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Bridging the Gap between Desktop and the Cloud for eScience Applications Storage Management in Virtualized Cloud Environment Adaptive Data Migration in Multi-tiered Storage Based Cloud Environment Performance Measurements and Analysis of Network I/O Applications in Virtualized Cloud Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1