Netinfo Security ›› 2014, Vol. 14 ›› Issue (10): 77-80.doi: 10.3969/j.issn.1671-1122.2014.10.014

Previous Articles     Next Articles

Research on Remote Trust Authentication in the Virtual Computing Platform

ZHENG Zhi-rong, LIU Yi   

  1. Computer Technology Institute of Navy, Beijing l00841, China
  • Received:2014-06-26 Online:2014-10-01 Published:2015-08-17

Abstract:

In the traditional computing platform, the trust chain is constructed in the way of trusted platform module, trusted BIOS, OS Loader, OS kernel. In the virtual computing platform, the trust chain is constructed in the way of trusted platform module, trusted BIOS, virtual machine monitor, manage virtual machine, user virtual machine OS Loader, user virtual machine OS kernel. The security requirement of the remote trust authentication in the virtual computing platform is analyzed. The authentication way of the virtual computing platform and the virtual machine management is put forward in order to prevent malicious virtual machine management to modify the virtual machine’s integrity proven. In the process of virtual machine authentication, remote challenger authenticate virtual machine or virtual platform. The combination of the physical PCRs and virtual PCRs way is put forward to prevent middleman attack.

Key words: virtual computing platform, integrity measurement, trust authentication

CLC Number: