Method and system for full life cycle security management of virtual machine

A technology of full life cycle and life cycle, which is applied in the field of providing security management of virtual machine life cycle on virtualized computing platform, and can solve problems such as TCB agent malicious attack.

Inactive Publication Date: 2012-01-25
道里云信息技术(北京)有限公司
View PDF5 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the adoption of cryptography protection in the process of deploying TCB agents, the untrustworthy middle-level management software on the platform cannot form malicious attacks on TCB agents, and the TCB agents can only be deployed according to communication regulations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for full life cycle security management of virtual machine
  • Method and system for full life cycle security management of virtual machine
  • Method and system for full life cycle security management of virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Various aspects of the disclosure are described below. It should be appreciated that the teachings herein may be embodied in a wide variety of forms and that any specific structure, function, or both disclosed herein are merely representative. Based on the teachings herein one skilled in the art should appreciate that an aspect disclosed herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented or a method practiced using any number of the aspects set forth herein. In addition, such an apparatus may be implemented or such a method may be practiced with other structure, functionality, or structure and functionality in addition to or in addition to one or more of the aspects set forth herein. Additionally, any aspect described herein may comprise at least one element of a claim.

[0034] With regard to the virtualization system, the term "virtualization...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a system and a method for providing full life cycle security management of a virtual machine on a virtualized computing platform. The system comprises a trusted computing base, a trusted computing base proxy object virtual machine and one or more object virtual machines, wherein the trusted computing base is operated on the bottom layer of the virtualized computing platform, and the trusted computing base proxy object virtual machine and one or more object virtual machines are operated on an object virtual machine layer of the virtualized computing platform. The trusted computing base proxy object virtual machine is established in another independent trusted secure computing environment of the virtualized computing platform, and is transmitted to the trusted computing base through an exclusive private secure communication channel established on the basis of a public key cryptography mechanism and a trusted authentication mechanism which is provided by a third party; moreover, the trusted computing base proxy object virtual machine is operated as a special object virtual machine which is deployed after the virtualized computing platform is started so as to act as an agent of the trusted computing base to provide service for client users. By using the system, the attacks initiated even by an internal system administrator from a data center can be resisted.

Description

technical field [0001] The present invention relates to the field of computing environment security, and more specifically, to a method and system for providing full life cycle security management of virtual machines on a virtualized computing platform. Background technique [0002] At present, it is well known that server virtualization technology, especially the server virtualization technology on the industry standard server platform X86 architecture (or standard Intel architecture "IA architecture") that has been formed in today's cloud computing data centers, effectively realizes Cloud computing is an information processing method based on the model of service provision, which can lease the computing, storage, network and other information processing resources of the data center to "tenant users" in a leased manner, and obtain efficient multi-tenant service applications. The cloud computing and cloud storage service platform is, for example, a server, a memory, and a ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F21/00G06F21/53
Inventor 毛文波
Owner 道里云信息技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products