网络与信息安全学报 ›› 2018, Vol. 4 ›› Issue (12): 32-43.doi: 10.11959/j.issn.2096-109x.2018098

• 学术论文 • 上一篇    下一篇

基于VMI的虚拟机远程证明方案

王伟1,2,陈兴蜀2,3(),兰晓2,金鑫1,2   

  1. 1 四川大学计算机学院,四川 成都 610065
    2 四川大学网络空间安全研究院,四川 成都 610065
    3 四川大学网络空间安全学院,四川 成都 610065
  • 修回日期:2018-11-29 出版日期:2018-12-15 发布日期:2018-12-30
  • 作者简介:王伟(1992-),男,山东聊城人,四川大学硕士生,主要研究方向为可信计算、虚拟化安全。|陈兴蜀(1968-),女,贵州六枝人,博士,四川大学教授、博士生导师,主要研究方向为云计算与大数据安全、可信计算与信息保障。|兰晓(1990-),女,四川自贡人,博士,四川大学助理研究员,主要研究方向为认证密钥协商协议、区块链安全。|金鑫(1976-),男,辽宁营口人,四川大学博士生,主要研究方向为可信计算、虚拟化安全。
  • 基金资助:
    国家自然科学基金资助项目(61802270);国家“双创”示范基地之变革性技术国际研发转化平台基金资助项目(C700011)

VMI-based virtual machine remote attestation scheme

Wei WANG1,2,Xingshu CHEN2,3(),Xiao LAN2,Xin JIN1,2   

  1. 1 College of Computer Science,Sichuan University,Chengdu 610065,China
    2 Cybersecurity Research Institute,Sichuan University,Chengdu 610065,China
    3 College of Cybersecurity,Sichuan University,Chengdu 610065,China
  • Revised:2018-11-29 Online:2018-12-15 Published:2018-12-30
  • Supported by:
    The National Natural Science Foundation of China(61802270);The Transformational Technology International Research Platform for National Dual Innovation Base(C700011)

摘要:

可信计算组织(TCG,trusted computing group)提出的虚拟机远程证明方案可以为云计算平台提供虚拟机完整性验证服务,而直接使用 TCG 提出的方案性能较低,并且会受到布谷鸟攻击的威胁。利用虚拟机自省技术(VMI,virtual machine introspection)设计了新的虚拟机远程证明方案。通过在虚拟机监视器(VMM,virtual machine monitor)中获取虚拟机远程验证证据的方法消除在虚拟机内执行布谷鸟攻击的路径,利用物理可信平台模块(TPM,trusted platform module)保证虚拟机远程验证证据的完整性,减少了身份证明密钥(AIK,attestation identity key)证书的产生数量,降低了私有证书颁发机构的负载。实验表明,方案可以有效验证虚拟机的完整性状态,在虚拟机数量较多的情况下,性能优于TCG提出的虚拟机远程证明方案。

关键词: 虚拟机远程证明, 布谷鸟攻击, 虚拟机自省技术, 可信平台模块, 身份证明密钥

Abstract:

The virtual machine attestation scheme proposed by trusted computing group (TCG) can provide attestation service of virtual machine for cloud computing.However,the service using the scheme proposed by the TCG directly would be threatened by the cuckoo attack and its performance would be lower.Therefore,a new virtual machine remote attestation scheme based on virtual machine introspection (VMI) was proposed.Firstly,it eliminated the path to perform cuckoo attacks in virtual machines via obtaining virtual machines′ remote attestation evidence in virtual machine monitor (VMM).Secondly,it used physical trusted platform module (TPM) to ensure the integrity of virtual machines’ remote attestation evidence and reduced the number of attestation identity key (AIK) certificates required during remote attestation to balance the load of private CA.Experiments show that the proposed scheme can verify the status of virtual machines correctly and increase the performance of bulk virtual machines’ remote attestation significantly.

Key words: virtual machine remote attestation, the cuckoo attack, virtual machine introspection, TPM, attestation identity key

中图分类号: 

No Suggested Reading articles found!