信息网络安全 ›› 2015, Vol. 15 ›› Issue (9): 70-73.doi: 10.3969/j.issn.1671-1122.2015.09.017

• • 上一篇    下一篇

可信计算硬件设备虚拟化关键保障机制研究

黄强(), 张德华, 汪伦伟   

  1. 信息保障技术重点实验室,北京100072
  • 收稿日期:2015-07-15 出版日期:2015-09-01 发布日期:2015-11-13
  • 作者简介:

    作者简介: 黄强(1977-),男,湖南,工程师,博士,主要研究方向:可信计算、信息安全;张德华(1977-),男,山东,高级工程师,博士,主要研究方向:信息安全;汪伦伟(1977-),男,安徽,高级工程师,博士,主要研究方向:信息安全。

Research on Trusted Computing Device Virtualization Critical Assurance Mechanisms

Qiang HUANG(), De-hua ZHANG, Lun-wei WANG   

  1. Information Assurance Technology Laboratory, Beijing 100072, China
  • Received:2015-07-15 Online:2015-09-01 Published:2015-11-13

摘要:

文章分析可信计算硬件设备虚拟化需求,研究可信计算硬件设备虚拟化支持模式及其保障机制,提出确保虚拟机平台构建可信计算机制所需的密钥独立和完整性状态独立两条原则,并在分析I/O设备主要虚拟化机制基础上,提出两条可信计算硬件设备虚拟化关键保障机制:在虚拟化软件层确保安全的域间通信;可信计算硬件设备需具有可扩展的设备内部存储空间。

关键词: 可信计算, 虚拟化, 保障机制

Abstract:

This paper analyzes the virtualization requirements of trusted computing hardware device, and studies the virtual support mode and assurance mechanism, and puts forward two principles of key independent principle and complete state independent principle that are needed when constructs trusted computing mechanism on virtual platform. On the basis of analyzing virtualization mechanisms of the main I/O equipments, this paper also puts forward two key virtualization assurance mechanisms of trusted computing hardware device: to ensure the secure inter-domain communication in the virtualization software layer; to ensure the trusted computing hardware device has an expandable internal storage space.

Key words: trusted computing, virtualization, assurance mechanism

中图分类号: