Virtual machine credibility guaranteeing method in cloud environment

A virtual machine and cloud environment technology, applied in the field of information security, can solve problems such as high pressure, reduce pressure, improve performance, and solve the problem of virtual machine migration.

Active Publication Date: 2014-06-25
WIND INFORMATION TECH CO LTD
View PDF5 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] (2) Calculation pressure of cloud server
In the existing architecture, the virtual root of trust module and the virtual machine are located on the same server. In addition to providing services to users, the server also provides computing power to the virtual root of trust module, which is under great pressure.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtual machine credibility guaranteeing method in cloud environment
  • Virtual machine credibility guaranteeing method in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]The main idea of ​​the method for guaranteeing the trustworthiness of the virtual machine proposed by the present invention is to separate the virtual trusted root module in the cloud server from the virtual machine, set up a separate device, and use this device to complete the trustworthiness measurement of the virtual machine. The main content includes the communication mechanism between the root of trust device and the cloud server, and the method of virtual machine trustworthiness assurance—the establishment and transmission of the trust chain. The specific implementation will be explained according to the accompanying drawings:

[0039] 1, figure 1 Introduce the communication mechanism between the root of trust device and the cloud server

[0040] Considering the safety problem of network transmission, the present invention designs a set of safe communication protocol. The communication protocol should guarantee the confidentiality, integrity and non-repudiation o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a virtual machine credibility guaranteeing method in a cloud environment and belongs to the field of information safety. The method is characterized in that a virtual credible root module is separated from each server in the cloud environment and is concentrated into a device, the device comprises a physical credible root, credible root virtualization is completed, credibility computing related work is provided for a virtual machine in the cloud environment, and main work content comprises two parts, namely establishing of the communication mechanism between the credible root device and the cloud server and the virtual machine credibility guaranteeing method. According to the method, the virtual credible root and the virtual machine are not on the same platform, virtual machine migration is needed, then the virtual machine and the virtual credible root are correlated again after virtual machine migration, and accordingly the problem of virtual machine migration is effectively solved.

Description

technical field [0001] The invention relates to a trusted guarantee method for a virtual machine in a cloud environment, which provides a safe and trusted solution for cloud platform users based on cloud computing and trusted computing technology, and belongs to the field of information security. Background technique [0002] As an emerging computing model, cloud computing has set off a new wave of industry with the advantages of pay-as-you-go, cost reduction, anytime, anywhere, energy saving and consumption reduction. In the cloud computing mode, users need to transfer their own data and applications to cloud servers or virtual machines for storage or operation. However, these data and applications may be subject to malicious theft, tampering, and threats from other users in the cloud. [0003] The continuous progress of trusted computing technology and security chip technology has put forward new ideas for solving these security problems. The basic idea of ​​trusted comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06
Inventor 王冠张少华庄俊玺周珺梁社静
Owner WIND INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products