Access Control Using Trusted Virtual Machine Based on Xen

被引:0
作者
Wang, Xi [1 ]
Cheng, Chuan [2 ]
机构
[1] Wuhan Polytech, Wuhan 430074, Peoples R China
[2] Commun Res Inst, Wuhan, Peoples R China
来源
APPLIED INFORMATICS AND COMMUNICATION, PT 5 | 2011年 / 228卷
关键词
Virtualization; Xen; Access Control; TPM; Virtual Machine Monitor;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Xen is an open-source para-virtualizing virtual machine monitor (VMM), or "hypervisor", for a variety of processor architectures including x86.Xen has impressive performance and easy to connect to LAN. This paper proposes a method of access control using trusted virtual machine based on Xen. Combined with trusted computing technique and virtualization technique, this model is mainly concerned about safe data access. The key idea is using the isolation of virtual machine to provide an exclusive environment to sensitive data and use trusted computing to ensure the virtual environment is trusted.
引用
收藏
页码:94 / +
页数:3
相关论文
共 10 条
  • [1] [Anonymous], 2005, P 2 C S NETW SYST DE
  • [2] [Anonymous], 2002, Tech. Rep. 02-02-01
  • [3] Barham P., 2000, P 19 ACM SOSP OCT
  • [4] Chen PM, 2001, EIGHTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS, P133
  • [5] Murray D. G., 2008, ACM VEE 2008 MARCH 5
  • [6] RUBINI A, 1998, LINUX DEVICE DRIVERS
  • [7] Rubini A., 1998, PERSISTENT SNAPSHOT
  • [8] Sailer R., 23363 RC IBM
  • [9] Trusted Computing Group, 2005, TCG TPM MAIN SPEC LE
  • [10] Trusted Computing Group, TCG TPM MAIN SPEC LE