网络与信息安全学报 ›› 2018, Vol. 4 ›› Issue (1): 6-14.doi: 10.11959/j.issn.2096-109x.2018009

• 学术论文 • 上一篇    下一篇

面向云环境的虚拟机可信迁移方案

张建标1,2(),朱元曦1,2,胡俊1,2,王晓1,2   

  1. 1 北京工业大学信息学部,北京 100124
    2 可信计算北京市重点实验室,北京 100124
  • 修回日期:2018-01-03 出版日期:2018-01-01 发布日期:2018-02-09
  • 作者简介:张建标(1969-),男,江苏海门人,博士,北京工业大学教授、博士生导师,主要研究方向为网络与信息安全、可信计算。|朱元曦(1993-),男,北京人,北京工业大学硕士生,主要研究方向为云计算、可信计算。|胡俊(1972-),男,湖南湘阴人,博士,北京工业大学讲师,主要研究方向为信息安全和可信计算。|王晓(1983-),女,河北石家庄人,北京工业大学博士生,主要研究方向为信息安全、可信计算。
  • 基金资助:
    国家自然科学基金资助项目(61671030);国家自然科学基金资助项目(U1405254);国家高技术研究发展计划(“863”计划)基金资助项目(2015AA016002)

Scheme of virtual machine trusted migration in cloud environment

Jianbiao ZHANG1,2(),Yuanxi ZHU1,2,Jun HU1,2,Xiao WANG1,2   

  1. 1 Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China
    2 Beijing Key Laboratory of Trusted Computing,Beijing 100124,China
  • Revised:2018-01-03 Online:2018-01-01 Published:2018-02-09
  • Supported by:
    The National Natural Science Fundation of China(61671030);The National Natural Science Fundation of China(U1405254);The National High-Tech R&D Program of China(2015AA016002)

摘要:

现今云计算技术迅猛发展,虚拟机迁移技术作为云服务的一项优势,受到了广泛的关注和应用。然而,虚拟机动态迁移过程中存在平台认证复杂、数据传输安全性差等问题有待解决。为此,首先分析了现有的基于可信计算技术的虚拟机迁移方案,提出了云环境下基于可信计算技术的虚拟机动态迁移方案的3项安全要求:平台认证、数据传输保护和虚拟可信根原子性保护。然后提出了面向云环境的虚拟机可信迁移方案,其中引入了虚拟机中央迁移引擎和可信迁移代理,实现了迁移过程的虚拟可信根的原子性保护。最后给出了具体的方案实现与验证。

关键词: 可信计算, 云计算, vTPCM, 虚拟机迁移

Abstract:

With the rapid development of cloud computing,as an advantage of cloud services,virtual machine migration technology has been widely noticed and applied.However,there are some problems about VMs migration which should be solved,such as the complication of authentication of platform and the security issues of data transmission,etc.For these problems,firstly,the existing virtual machine migration scheme based on trusted computing technology was analyzed.Secondly,three secure needs that the virtual machine migration scheme which based on trusted computing technology should meet were proposed:the authenticated platform,confidentiality and integrity preserving transfer and atomicity of the vTPCM.Thirdly,a trusted migration scheme of virtual machines for cloud environment was proposed,in which the virtual machine central migration engine and trusted migration agent were introduced to solve the atomicity protection of vTPCM during the migration process.Finally,the concrete scheme was given with verification.

Key words: trusted computing, cloud computing, vTPCM, virtual machine migration

中图分类号: 

No Suggested Reading articles found!