Font Size: a A A

Research On Key Technologies Of Virtual Trusted Root Management Framework In Cloud Environment

Posted on:2019-07-20Degree:MasterType:Thesis
Country:ChinaCandidate:S S YangFull Text:PDF
GTID:2428330593450325Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the booming development of cloud computing technology,cloud computing has brought many advantages such as the allocation of resources according to needs,high availability,and cost savings for enterprises and governments.Enterprises and governments have carried out large-scale practice and application of the cloud computing industry.At the same time,the security problems brought about by the cloud computing environment have also caused concerns for enterprises and governments.They have received extensive attention at home and abroad and have also become an important factor hindering the development of cloud computing.Therefore,the security issues in the cloud computing environment have been solved.It is particularly important.Trusted computing technology is one of the core technologies of information security.It can provide solutions to the trust problem of cloud computing environments.With the development of trusted computing technology,Trusted Computing has transformed from passive defense to active immune dual system architecture.Trusted computing is used to establish trust from hardware to software for cloud computing environments.It is an effective way to solve the problem of cloud computing environment security.By extending the trust of cloud computing platform from the hardware to the virtualization layer and providing trusted computing services for the virtual machine,the trust problem of the virtual machine in the cloud computing environment is effectively solved.However,there are still some problems in the existing solutions that use trusted computing technology and virtualization to solve the virtual machine trust problem.First,currently existing solutions mainly focus on trusted defense of passive defense.Second,due to the difference between the state of virtual machines and physical machines,the correlation between virtual machines and virtual trusted roots is not strong,and there is no effective management of virtual trusted roots.In view of the current problems,the research work in this paper includes:(1)Through the use of active immune trusted computing technology,trust is extended from the physical machine in the cloud environment to a virtual machine,a trusted cloud architecture with active immune function is established,and the virtual trusted root trust in the cloud trusted architecture is analyzed.The process of chain establishment and delivery,and the use of trusted computing technology combined with virtualization technology to provide trusted computing services for virtual machines.(2)By comparing the status of physical machines and virtual machines,comparing the correlation between physical machines and hardware trusted roots,virtual machines and virtual trust roots from two aspects of life cycle and trust chain,we propose a virtual trusted root management framework based on the trusted computing technology of active immunity that enables effective management of virtual roots and enhances the relevance of virtual machines and virtual roots.(3)Using the proposed virtual root-of-trust framework,we design and implement a VM-vTPCM software prototype system for cloud environment and perform deployment testing on the KVM platform.The experimental verification of the design of the virtual trusted root management framework is carried out.The virtual trusted root can provide the trusted service during the entire life cycle of the virtual machine,so as to effectively solve the trust problem of the virtual machine in the cloud environment.
Keywords/Search Tags:Cloud Security, Trusted Cloud, Trusted Computing, Virtual Trusted Root
PDF Full Text Request
Related items