Font Size: a A A

Research On Key Technologies Of Root Of Trust For Cloud Environment

Posted on:2014-01-09Degree:MasterType:Thesis
Country:ChinaCandidate:B LiuFull Text:PDF
GTID:2248330398471975Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Following the personal computer, the age of the Internet, cloud computing is seen as the third wave of IT. Cloud computing is a delivery and usage model of computing resource, resources such as Hardware, systems, software and services can be visited by users through the network on demand, and cloud computing has the following characteristic:ultra-large-scale, virtualization, versatility and on-demand services and high scalability.But the cloud is an open, dynamic distributed systems, there will be some unpredictable behaviors, which introduce new risks. From the view of users, they are required to put their data on the cloud, which makes them lose direct control over their data. The cloud providers may steal or tamper with the user’s data. Compared with reducing the cost of storage and processing of data, users are more concerned about the security of their data, and what kind of harm will be brought when losing data. From the view of the cloud providers, users can run software as they want, which may also introduce untrusted factors, which may introduce unpredictable damage to other users.This paper focuses on Virtual Root of Trust and Trusted Virtual Execution Environment, and first introduces trust computing and virtualization technology, including TPM, full-virtualization and para-virtualization. On these basises, This paper implments virtual TPM in Qemu, and codes test program for vTPM. And also this paper has built a Trusted Virtual Execution Evironment including static detection and runtime detection. Static detection is responsible for modifications on filesystem while runtime detection responsible for modifications on memory.At last, this paper analyzes the effectiveness of Trusted Virtual Execution Evironment through experiment including detections on filesystem and memory, and then summarizes the overhead brought by this machenism by comparing time cost by trusted virtual machine(VM), seni-trusted VM and untrusted VM, to conclude whether vTPM or IMA is the main cause of extra overhead. Trusted Virtual Execution Evironment can detect untrusted behaviors on filesystem effectively and untrusted. behaviors in memory at certain level.
Keywords/Search Tags:Cloud Computing, virtual Root of trust, Trusted Virtual ExecutionEnvironment, Virtual Machine Monitor (VMM)
PDF Full Text Request
Related items