An Active Trusted Model for Virtual Machine Systems

Virtualization is a new area for research in recent years, and virtualization technology can bring convenience to the management of computing resources. Together with the development of the network and the network computing, it gives the virtualization technology more scenarios. The cloud computing technology uses the virtualization technology as while. With the development of the technology, it meets some security problems, such as rootkit attacks and malignant tampers. Malicious programs can plug into the system, and be booted at the any time of the virtualized system. There is little theoretical research on booting a trusted virtualized system. We propose an active trusted model in order to give a theoretical model for not only analyzing the state of a virtualized system, but also helping to design trusted virtual machine application. TBoot is a project to boot a trusted virtual machine. We use our model to illustrate that TBoot can boot a trusted virtual machine theoretically.

[1]  Huanguo Zhang,et al.  A Trusted Computing Model Based on Code Authorization , 2008, 2008 International Symposiums on Information Processing.

[2]  Jeffrey P. Buzen,et al.  The evolution of virtual machine architecture , 1973, AFIPS National Computer Conference.

[3]  Matthew Arnold,et al.  A Survey of Adaptive Optimization in Virtual Machines , 2005, Proceedings of the IEEE.

[4]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[5]  C. R. Attanasio Virtual machines and data security , 1973 .

[6]  Brian D. Noble,et al.  When virtual is better than real [operating system relocation to virtual machines] , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.

[7]  Brian Berger,et al.  Trusted computing group history , 2005, Inf. Secur. Tech. Rep..

[8]  Gil Neiger,et al.  Intel virtualization technology , 2005, Computer.

[9]  Robert P. Goldberg,et al.  Architectural Principles for Virtual Computer Systems , 1973 .

[10]  Vittore Casarosa,et al.  VHM : a Virtual Hardware Monitor , 1973 .

[11]  Robert P. Goldberg,et al.  Architecture of virtual machines , 1973, Workshop on Virtual Computer Systems.

[12]  James E. Smith,et al.  The architecture of virtual machines , 2005, Computer.

[13]  Tal Garfinkel,et al.  Virtual machine monitors: current technology and future trends , 2005, Computer.

[14]  Chris Mitchell Trusted Computing (Professional Applications of Computing) (Professional Applications of Computing) , 2005 .

[15]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[16]  Stefan Berger,et al.  vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.

[17]  Eli M. Dow,et al.  Xen and the Art of Repeated Research , 2004, USENIX Annual Technical Conference, FREENIX Track.

[18]  Robert Rose Survey of System Virtualization Techniques , 2004 .