• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Huang, Hao-Xiang (Huang, Hao-Xiang.) | Zhang, Jian-Biao (Zhang, Jian-Biao.) | Yuan, Yi-Lin (Yuan, Yi-Lin.) | Wang, Xiao (Wang, Xiao.)

Indexed by:

EI

Abstract:

As a new type of high-value computing system, cloud computing has been widely used in various industries fields. Classified protection 2.0 also puts forward the requirement of dynamic trust verification for its application of active immune trusted computing technology. In the cloud computing mode, the virtual machine is the direct carrier for users to use cloud services, and its trusted startup is the basis for the trustworthiness of the virtual machine operating environment. However, since the virtual machine runs on the physical node in the form of process, its characteristics of startup process are high dynamic and unexpected interference between multiple virtual machine domains. But the existing trusted startup schemes of virtual machine have problems such as insufficient dynamic protection during virtual machine startup process and lack of elimination of unexpected interference between multiple virtual domains. To solve the above problems, this study proposes a scheme that research on trusted startup of virtual machine based on non-interference theory. Firstly, based on the non-interference theory, the run-time trusted theorem of virtual machine process is proposed. In addition, the definition of trusted launch of virtual machine is given and the judgement theorem of trusted boot of virtual machine is well proved. Then, according to the trusted startup theorem of virtual machine, the monitoring and control logic is designed based on system call, and the virtual machine startup process is actively measured and controlled. Finally, the experimental evaluation shows that the proposed scheme can effectively eliminate the unexpected interference between multiple virtual machines in complex cloud environment, ensure the dynamic credibility of virtual machine startup process, and greatly reduce the performance overhead. © 2023 Chinese Academy of Sciences. All rights reserved.

Keyword:

Process control Dynamics Network security Virtual machine Trusted computing Computation theory Cloud computing

Author Community:

  • [ 1 ] [Huang, Hao-Xiang]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Huang, Hao-Xiang]Beijing Key Laboratory of Tusted Computing, Beijing; 100124, China
  • [ 3 ] [Zhang, Jian-Biao]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 4 ] [Zhang, Jian-Biao]Beijing Key Laboratory of Tusted Computing, Beijing; 100124, China
  • [ 5 ] [Yuan, Yi-Lin]Faculty of Information Technology, Beijing University of Technology, Beijing; 100124, China
  • [ 6 ] [Yuan, Yi-Lin]Beijing Key Laboratory of Tusted Computing, Beijing; 100124, China
  • [ 7 ] [Wang, Xiao]School of Science and Technology, Tianjin University of Finance and Economics, Tianjin; 300222, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Journal of Software

ISSN: 1000-9825

Year: 2023

Issue: 6

Volume: 34

Page: 2959-2978

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 3

Affiliated Colleges:

Online/Total:498/10599391
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.