在云计算环境中增强信任

Bingyu Zou, Huanguo Zhang
{"title":"在云计算环境中增强信任","authors":"Bingyu Zou, Huanguo Zhang","doi":"10.1109/ICCIAUTOM.2011.6183990","DOIUrl":null,"url":null,"abstract":"Nowadays cloud computing is becoming more and more popular. As it saves cloud user the budget to purchase relatively expensive and easily outdated hardware and the energy to maintain system, some compromises comes along as well, such as computing environment and stored data out of control, which put cloud user on the horns of a dilemma. In order for cloud users to have more faith with the security of computing environment and data on the remote uncontrolled cloud, trust should be build between them. It's easier to trust when you can verify. We took advantage of sealed storage of trust computing to improve traditional trust chain technology in order to provide a dual verifiable trusted bootstrap to make sure each compartment during system bootstrap not to be maliciously changed. We extend trusted chain to memory by developing monitoring tools in privileged domain using features provided by virtual machine monitor to monitor and record runtime states of security critical application in targeted virtual machine instance. Measurements of system configurations stored in platform configuration registers of TPM along with runtime states of application in cloud user's vm are reported to corresponding cloud user through remote attestation which is a key feature of trusted computing as well in order to provide genuine evidences to cloud user.","PeriodicalId":177039,"journal":{"name":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Toward enhancing trust in cloud computing enviroment\",\"authors\":\"Bingyu Zou, Huanguo Zhang\",\"doi\":\"10.1109/ICCIAUTOM.2011.6183990\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays cloud computing is becoming more and more popular. As it saves cloud user the budget to purchase relatively expensive and easily outdated hardware and the energy to maintain system, some compromises comes along as well, such as computing environment and stored data out of control, which put cloud user on the horns of a dilemma. In order for cloud users to have more faith with the security of computing environment and data on the remote uncontrolled cloud, trust should be build between them. It's easier to trust when you can verify. We took advantage of sealed storage of trust computing to improve traditional trust chain technology in order to provide a dual verifiable trusted bootstrap to make sure each compartment during system bootstrap not to be maliciously changed. We extend trusted chain to memory by developing monitoring tools in privileged domain using features provided by virtual machine monitor to monitor and record runtime states of security critical application in targeted virtual machine instance. Measurements of system configurations stored in platform configuration registers of TPM along with runtime states of application in cloud user's vm are reported to corresponding cloud user through remote attestation which is a key feature of trusted computing as well in order to provide genuine evidences to cloud user.\",\"PeriodicalId\":177039,\"journal\":{\"name\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"volume\":\"151 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIAUTOM.2011.6183990\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 2nd International Conference on Control, Instrumentation and Automation (ICCIA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIAUTOM.2011.6183990","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

如今,云计算正变得越来越流行。在为云用户节省了购买相对昂贵且容易过时的硬件的预算和维护系统的精力的同时,也带来了一些妥协,例如计算环境和存储数据失控,这使云用户处于两难境地。为了让云用户对远程不受控制的云上的计算环境和数据的安全性有更多的信心,需要在云用户和云用户之间建立信任。当你能证实时,就更容易信任。我们利用信任计算的密封存储对传统的信任链技术进行改进,以提供双重可验证的可信引导,确保系统引导过程中的每个分区不被恶意更改。我们利用虚拟机监视器提供的特性,在特权域中开发监视工具,将信任链扩展到内存,以监视和记录目标虚拟机实例中安全关键应用程序的运行时状态。通过远程认证将存储在TPM平台配置寄存器中的系统配置测量值以及云用户vm中的应用运行时状态报告给相应的云用户,这也是可信计算的一个重要特征,从而为云用户提供真实的证据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Toward enhancing trust in cloud computing enviroment
Nowadays cloud computing is becoming more and more popular. As it saves cloud user the budget to purchase relatively expensive and easily outdated hardware and the energy to maintain system, some compromises comes along as well, such as computing environment and stored data out of control, which put cloud user on the horns of a dilemma. In order for cloud users to have more faith with the security of computing environment and data on the remote uncontrolled cloud, trust should be build between them. It's easier to trust when you can verify. We took advantage of sealed storage of trust computing to improve traditional trust chain technology in order to provide a dual verifiable trusted bootstrap to make sure each compartment during system bootstrap not to be maliciously changed. We extend trusted chain to memory by developing monitoring tools in privileged domain using features provided by virtual machine monitor to monitor and record runtime states of security critical application in targeted virtual machine instance. Measurements of system configurations stored in platform configuration registers of TPM along with runtime states of application in cloud user's vm are reported to corresponding cloud user through remote attestation which is a key feature of trusted computing as well in order to provide genuine evidences to cloud user.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A dynamic scheduling parallel test system with CVI A research of algorithm based on probability weighted fuzzy association rules Design of assembly line of diesel engine factory based on RFID technology Application of genetic algorithm in computer aided design A new method of parameters determined in image recognition by PCNN
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1