Netinfo Security ›› 2018, Vol. 18 ›› Issue (1): 1-8.doi: 10.3969/j.issn.1671-1122.2018.01.001

• Orginal Article •     Next Articles

The Design Framework of Reconfi gurable Virtual Root of Trust in Cloud Environment

Jianbiao ZHANG1,2,3, Zixiao ZHAO1,2,3(), Jun HU1,2,3, Xiao WANG1,2,3   

  1. 1. Faculty of Information Technology, Beijing University of Technology, Beijing 100124, China
    2. Beijing Key Laboratory of Trusted Computing, Beijing 100124, China
    3. National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing 100124,China
  • Received:2017-11-01 Online:2018-01-20 Published:2020-05-11

Abstract:

With the emergence of trusted computing technology trusted cloud has gradually become a major solution to the problem of cloud security. However, the trusted source of the trusted cloud -- virtual root of trust still has some problems: support TPM only, does not support TPCM, can not do active defense; internal structure is inconvenient to modify or extend; the use of cryptographic algorithm meet foreign standards only which is not autonomous and controllable. Therefore, we present a new design scheme of virtual root of trust, which reconstructs the root of trust in a modular structure. The modules cooperate with each other through the internal unified message format to provide security and reliable environment for the cloud. Based on this scheme, the reconfigurable virtual root or trust has the following characteristics: high scalability, its structure is easy to transform so as to achieve multiple heterogeneous, can simulate different TPM or TPCM architecture; autonomous and controllable, its cryptographic algorithm follows the national standard.

Key words: trusted computing, virtual root of trust, vTPCM, reconfigurable, autonomous and controllable

CLC Number: