Netinfo Security ›› 2015, Vol. 15 ›› Issue (11): 7-8.doi: 10.3969/j.issn.1671-1122.2015.11.002

Previous Articles     Next Articles

Research on VT-d based Virtual Machine Isolation Framework

YANG Yong-jiao1, YAN Fei2,3, YU Zhao2,3, ZHANG Huan-guo2,3   

  1. 1. Guangdong Power Grid Co., Ltd., Information Center, Guangzhou Guangdong 510080, China
    2.School of Computer, Wuhan University, Wuhan Hubei 430072, China
    3.Key Laboratory of Aerospace Information Security and Trusted Computing Ministry of Education, Wuhan University , Wuhan Hubei 430072, China
  • Received:2015-09-07 Online:2015-11-25 Published:2015-11-20

Abstract:

As the basis of cloud computing IaaS service, virtualization technology can fundamentally solve the threats that the virtual machines face on the cloud computing platform. In view of the deficiencies of the current cloud computing virtual machine isolation implementation environment in the aspect of device I/O and memory access isolation, this paper presents security isolation framework on a Xen cloud platform, combining the ideal of virtualization technology VT-d with trusted computing independent domain. In the framework, data and code encryption is implemented by vTPM independent domain, which encrypts the VM image. The framework assigns NIC to VM through VT-d technology, and extends the authorization control of grant table mechanism in XSM module. Experiments and analysis show that the framework is able to ensure device I/O and memory access security isolation between the virtual machines effectively, enhance the security of virtual machine isolation environment, and meet the system performances.

Key words: virtualization, trusted computing, isolation, VT-d, vTPM

CLC Number: