Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing

被引:11
|
作者
Mei, Songzhu [1 ]
Wang, Zhiying [1 ]
Cheng, Yong [1 ]
Ren, Jiangchun [1 ]
Wu, Jiangjiang [1 ]
Zhou, Jie [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
bytecode virtual machine; trusted computing; cloud computing; remote attestation; Bayesian network;
D O I
10.1080/18756891.2012.733231
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing bring a tremendous complexity to information security. Remote attestation can be used to establish trust relationship in cloud. TBVMM is designed to extend the existing chain of trust into the software layers to support dynamic remote attestation for cloud computing. TBVMM uses Bayesian network and Kalman filter to solve the dynamicity of the trusted relationship. It is proposed to fill the trust gap between the infrastructure and upper software stacks.
引用
收藏
页码:924 / 932
页数:9
相关论文
共 50 条
  • [1] Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing
    Songzhu Mei
    Zhiying Wang
    Yong Cheng
    Jiangchun Ren
    Jiangjiang Wu
    Jie Zhou
    International Journal of Computational Intelligence Systems, 2012, 5 : 924 - 932
  • [2] AN ANONYMOUS REMOTE ATTESTATION FOR TRUSTED CLOUD COMPUTING
    Zhang, Yong
    Li, Xiangxue
    Qian, Haifeng
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 426 - 429
  • [3] Threshold remote attestation on trusted cloud computing
    Zhao, Yong
    Xue, Fei
    Zhang, Yanxue
    Journal of Applied Sciences, 2013, 13 (09) : 1592 - 1596
  • [4] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [5] Application of Trusted Virtual Environment Module in Cloud Computing
    Hu Yu
    SUSTAINABLE DEVELOPMENT OF NATURAL RESOURCES, PTS 1-3, 2013, 616-618 : 2196 - 2199
  • [6] An Effective Approach for Remote Attestation in Trusted Computing
    Huang, Xin
    Peng, Yuxing
    2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 80 - +
  • [7] A remote anonymous attestation protocol in trusted computing
    Liu, Jiqiang
    Zhao, Jia
    Han, Zhen
    2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 3688 - 3693
  • [8] Trusted virtual machine management model for cloud computing
    Zhou, Zhen-Ji
    Wu, Li-Fa
    Hong, Zheng
    Lai, Hai-Guang
    Zheng, Cheng-Hui
    1600, Editorial Board of Journal on Communications (35): : 94 - 105
  • [9] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [10] MONITORING AND ATTESTATION OF VIRTUAL MACHINE SECURITY HEALTH IN CLOUD COMPUTING
    Zhang, Tianwei
    Lee, Ruby B.
    IEEE MICRO, 2016, 36 (05) : 28 - 37