Font Size: a A A

Design And Implementation Of Cloud Security Oriented Virtual Domain Trusted Root

Posted on:2014-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:K LiuFull Text:PDF
GTID:2268330392473348Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Cloud computing is a new way of Internet-based computing, which, through thevirtualization technology, maximizes the utilization of resources in the cloudplatform, and integrates the computing resources, storage resources and networkresources to constitute a large-scale resource pool. The application system is ableto access to computing resources, storage space on demand, helping cloud users togreatly reduce operating costs. However, with great convenience, cloud computingalso makes cloud users have to face many risks, because cloud users lose control oftheir resources, and the current cloud computing is lack of a perfect credibleguarantee mechanism.Security issues in the cloud computing environment largely because virtualizationtechnology resources virtual shared,and this paper is aim to deploy an effectivetrusted assurance mechanism, to enhance the security and reliability of the cloudcomputing environment through the trusted computing and security monitoringtechnology. In this paper, research the typical security issues in the cloudvirtualization platform, and study related security technologies, and focus on thetrusted assurance mechanism for the cloud virtualization platform. The main contentsare as follows:Research the virtualization security issues. Based on the principle and method,these issues can be divided into VM (virtual machines) transboundary acts and VMultra vires acts. Then research the security technologies, which can be divided intothe VM security technology and VMM (Virtual Machines Monitor) securitytechnology.Discuss the virtualization trusted system framework for the cloud security. Theframework can enhance the security and reliability for the cloud virtualizationplatform by providing boot security and running-time security monitoring. Inaddition, the framework can also provide the platform stat attestation for the cloudusers.Aiming at building of the virtual domain root of trust, the paper achieves virtualroot of trust module, and related device driver and manager modules. Besides thepaper study the trust chain mechanism in the virtual environment based on the virtualdomain root of trust.
Keywords/Search Tags:virtualization security, trusted computing, virtual domain trust root
PDF Full Text Request
Related items