Netinfo Security ›› 2016, Vol. 16 ›› Issue (4): 17-22.doi: 10.3969/j.issn.1671-1122.2016.04.003

• Orginal Article • Previous Articles     Next Articles

Research of Virtual Trusted Cryptography Module’s Secret Key Management Based on the Trusted Root Server

Guan WANG1,2, Huahao YUAN1,2()   

  1. 1. College of Computer, Beijing University of Technology, Beijing 100124, China
    2. Beijing Key Laboratory of Trusted Computing, Beijing 100124, China
  • Received:2016-02-10 Online:2016-04-20 Published:2020-05-13

Abstract:

Trusted computing is one of the important method to protect the cloud environment. The trusted root server is a good solution to protect the virtual machine with the trusted computing technology. The trusted root server is based on the physical trusted chip and provide services for all of the virtual machine by virtualizing the trusted chip in the cloud environment. The virtual trusted chips on the server are under the management of a called management part. This paper used the homemade trusted cryptography module as the root of trust and based on the cryptographic support platform for trusted computing .This paper analyzed the secret keys in the physical TCM, and researched the secret key management in the trusted root server. Finally, this paper gave a solution on the generation, storage and load for the secret keys. In the solution, all the vTCM’s secret keys are generate in the physical TCM to keep the keys comply with the specifications.

Key words: the trusted root server, secret key management, trusted cryptography module

CLC Number: