Font Size: a A A

Research On Trusted Security Technology In Cloud Computing Based On Virtual Machine

Posted on:2014-06-12Degree:MasterType:Thesis
Country:ChinaCandidate:T JiFull Text:PDF
GTID:2268330422967246Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
As a new computing model, cloud computing provides users with computing andstorage resources in a dynamic, scalable and on-demand way through the network. It’s theresult of the changes occurred in computing models, not only driven by the technologicalinnovation, but also driven by users’ demand. Virtualization technology is widely used incloud computing environment. With the development of cloud computing technology and itsapplications, virtualization technology gradually matures. Cloud computing serviceproviders can dynamically adjust service resources by use of virtualization technology.Meanwhile, the service resources can be adjusted much closer to the actual needs of users.However, because the cloud computing service has some new features, such as theseparation of data management and data ownership, and the service usually locates indifferent regions, cloud computing faces more severe security challenges than traditionalinformation systems under the circumstances that resources are shared by users.With the emergence and the development of trusted computing technology, new ideasand methods have been brought to the research of information system security. The core oftrusted computing is the trusted platform module (TPM). TPM is a small system on chipcontaining cryptographic operation components and storage components. It’s atamper-resistant chip which can measure the integrity of systems. The root of trust formeasurement, root of trust for storage and root of trust for reporting, which are establishedbased on TPM, are the foundations of both the delivery of the trust chain and the creation oftrusted platforms. The trust chain established in such environment can ensure users the trustand the security of trusted platforms through the whole process from the boot of thecomputer to the boot of the system.Security mechanisms in trusted computing technology are introduced to cloudcomputing environment in the paper. A safe and reliable cloud computing platform andservice can be guaranteed with the combination of trusted computing technology andvirtualization technology. On the one hand, utilizing virtualization technology, through theuse of isolation virtual machine provides, can better solve the problems in the process ofapplying trusted computing technology to the native system, and can make up for securitydeficiencies of the native system for its lack of isolation. On the other hand, utilizing trustedcomputing technology can solve the problems that virtual machine system can not guarantee its integrity, and can better ensure the integrity and the trust of the platform which hostsvirtual machine systems.By studying in the trusted computing platform, a novel architecture of a platform withhigh reliability is proposed in the paper. The platform is based on security mechanisms oftrusted computing. The virtual machine monitor is driven by TPM to prevent users fromleaking confidential data when using cloud computing resources. Trust is based on thetrusted computing platform. The risk of using the cloud computing resources can be reducedby leveraging the verification mechanism. In addition, both local and remote end can trusteach other by strengthening the security of virtual machine migration mechanism andcarrying out the verification process. Users’ data can be securely guarded with the help ofthe virtual trusted platform module. Data leaking and other circumstances can be avoided inthe virtual machine migration process. Finally, a trusted environment is established based onTPM emulator. The migration process of virtual trusted platform module states isimplemented. The results show that the migration of virtual trusted platform module statescan be securely implemented across the platforms.
Keywords/Search Tags:Cloud computing, trusted computing, trusted platform module, virtual trustedplatform module, virtual machine migration, Xen
PDF Full Text Request
Related items