信息网络安全 ›› 2020, Vol. 20 ›› Issue (2): 7-13.doi: 10.3969/j.issn.1671-1122.2020.02.002

• • 上一篇    下一篇

基于可信软件基的虚拟机动态监控机制研究

王晓1,2, 赵军3, 张建标1,2()   

  1. 1.北京工业大学信息学部,北京 100124
    2.可信计算北京市重点实验室,北京 100124
    3.张家口学院,张家口 075000
  • 收稿日期:2019-10-22 出版日期:2020-02-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:王晓(1983—),女,河北,博士研究生,主要研究方向为信息安全、可信计算、云计算等;赵军(1978—),男,河北,副教授,硕士,主要研究方向为网络安全、可信计算等;张建标(1969—),男,江苏,教授,博士,主要研究方向为信息安全、可信计算等。

  • 基金资助:
    国家自然科学基金[61971014];河北省教育厅科技项目[Z2017158];国防科技实验信息安全实验室对外开放项目[2015XXAQ08]

Research on Dynamic Monitoring Mechanism for Virtual Machine Based on Trusted Software Base

WANG Xiao1,2, ZHAO Jun3, ZHANG Jianbiao1,2()   

  1. 1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
    2. Beijing Key Laboratory of Trusted Computing, Beijing 100124, China
    3. Zhangjiakou University, Zhangjiakou 075000, China
  • Received:2019-10-22 Online:2020-02-10 Published:2020-05-11

摘要:

在云计算环境中,虚拟机是云服务提供商为云用户提供服务的主要载体。虚拟机运行过程中的安全可信性至关重要,直接关系到云用户服务的安全可信性。针对虚拟机运行过程中的行为可信性问题,文章提出基于主动免疫可信计算技术的虚拟机动态监控机制。该机制将主动免疫可信计算的双系统体系架构部署在虚拟机系统内部,利用可信软件基实现对虚拟机运行行为的主动可信度量及主动控制,保证了虚拟机运行过程中的安全可信性,解决了云用户服务的安全可信性问题。

关键词: 云安全, 主动免疫可信计算, 可信软件基, 虚拟机动态监控

Abstract:

In cloud computing environment, virtual machine(VM)is the main carrier for cloud service providers to provide services for cloud users. The security and credibility of VM is very important in the process of VM running, which is directly related to the security and credibility of cloud user services. Aiming at the problem of behavior credibility in the process of VM running, this paper proposes a dynamic monitoring mechanism of VM based on active immune trusted computing technology. By deploying the dual-system architecture of active immune trusted computing in the VM system, and using the trusted software base (TSB) to realize the active trusted measurement and active control of the VM running behavior, the mechanism ensures the security credibility of the VM running process, and solves the security credibility problem of cloud user services.

Key words: cloud security, active immune trusted computing, trusted software base, virtual machine dynamic monitoring

中图分类号: