期刊文献+

基于SR-IOV的TCM硬件虚拟化构建可信虚拟环境 被引量:5

Building Trusted Virtual Environment by TCM Hardware Virtualization Based on SR-IOV
原文传递
导出
摘要 虚拟可信密码模块(vTCM)架构在安全和性能上均存在缺陷,不满足特殊应用场景下高安全性的需求.本文基于设备虚拟化技术提出了一种TCM硬件虚拟化的实现架构,利用该架构设计密钥结构,得到构建高安全可信虚拟环境的方法,为虚拟机提供硬件级的可信密码服务.可行性验证分析表明,本系统能够增强可信虚拟环境安全性,提高系统效率. The current vTCM architecture has some flaws in security and performance, so it cannot meet the requirements of high security in the special application scenes. Based on the device virtualization SR-IOV(single root I/ O virtualization) technology, we propose a kind of framework of TCM hardware virtualization, and design the key structure . Then we find the method of constructing high security trusted virtual environment, which can provide trusted cryptographic service for virtual machine. As can be seen from the feasibility verification and analysis , the system can enhance the security of trusted virtual environment, and improve the efficiency of the system.
出处 《武汉大学学报(理学版)》 CAS CSCD 北大核心 2017年第2期117-124,共8页 Journal of Wuhan University:Natural Science Edition
基金 国家科技重点专项"核高基"(2013ZX01029002-001)
关键词 单根设备虚拟化 TCM硬件虚拟化 可信虚拟环境 SR-IOV(single root I/O virtualization) TCM hardware virtualization trusted virtual environment
  • 相关文献

参考文献6

二级参考文献76

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:253
  • 2MENG QingShu,ZHANG HuanGuo,YANG Min,WANG ZhangYi.Analysis of affinely equivalent Boolean functions[J].Science in China(Series F),2007,50(3):299-306. 被引量:5
  • 3国家密码管理局.可信计算密码支撑平台功能与接口规范[S].2007.
  • 4Trusted Computing Group.TPM main specification,version 1.2[EB/OL].http://www.trustedcomputinggroup.org,2003.
  • 5KUHN U,SELHORST M,STUBLE C.Realizing property-based attestation and sealing with commonly available hard-and software[A].Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing[C].Alexandria,Virginia,USA,2007.
  • 6CHEN L,LANDFERMANN R,L(O)HR H.A protocol for property-based attestation[A].Proceedings of the First ACM Workshop on Scalable Trusted Computing[C].Alexandria,Virginia,USA,2006.
  • 7SADEGHI A R,STUBL C.Property-based attestation for computing platforms:caring about properties,not mechanisms[A].Proceedings of the 2004 Workshop on New Security Paradigms[C].New York,NY,USA,2004.
  • 8PORITZ J,SCHUNTER M,HERREWEGHEN E V.Property Attestation-Scalable and Privacy-friendly Security Assessment of Peer Computers[R].IBM Research,Technical Report RZ 3548.2004.
  • 9SHEEHY J,COKER G,GUTTMAN J.Attestation:Evidence and Trust MITRE[R].Technical Report,MTR080072,2008.
  • 10GARFINKEL T,PFAFF B,CHOW J.Terra:a virtual machine-based platform for trusted computing[A].Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles[C].New York,NY,USA,2003.

共引文献54

同被引文献59

引证文献5

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部