Dynamic trustworthiness verification mechanism for trusted cloud execution environment

被引:0
作者
Liu, Chuan-Yi [1 ,3 ]
Lin, Jie [2 ,3 ]
Tang, Bo [4 ]
机构
[1] Software School, Beijing University of Posts and Telecommunications
[2] School of Computer Science and Technology, Beijing University of Posts and Telecommunications
[3] Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education
[4] Department of IT Construction, Postal Savings Bank of China
来源
Ruan Jian Xue Bao/Journal of Software | 2014年 / 25卷 / 03期
关键词
Cloud computing; Trusted computing; Trusted platform module; Trustworthiness verification;
D O I
10.13328/j.cnki.jos.004447
中图分类号
学科分类号
摘要
Providing a provable and verifiable execution environment for the tenants is a very important problem in the cloud computing mode. This paper proposes a dynamic trustworthiness verification mechanism for the tenants' virtual execution environment, named TCEE (trusted cloud execution environment), which extends the current trusted chain into virtual machine's architecture stack. It cyclically verifies the trustworthiness of the memory and file systems within the virtual execution environments. TCEE introduces a TTP (trusted third party) to perform the verification and audit action against tenants' virtual machines to avoid heavy involvement of end tenants and unnecessary information leakage of the cloud providers. A prove-of-concept prototype is implemented according to TCEE to evaluate the effectiveness and the performance overhead incurred. Experimental results show that TCEE is effective and its performance overhead is minor. © Copyright 2014, Institute of Software, the Chinese Academy of Science. All rights reserved.
引用
收藏
页码:662 / 674
页数:12
相关论文
共 22 条
  • [21] Reiner S., Zhang X.L., Trent J., Sailer R., Zhang X.L., Jaeger T., van Doorn L., Design and implementation of a TCG-based integrity measurement architecture, Proc. of the USENIX Security Symp., (2004)
  • [22] Mario S., Stamer H., A software-based trusted platform module emulator, Proc. of the Trusted Computing-Challenges and Applications, pp. 33-47, (2008)