Virtualization-based credible server trust chain construction method

A construction method and server technology, which is applied to the construction method of trusted server trust chain, belongs to the field of server information trustworthy construction, can solve problems such as difficult defense against malicious threats, and achieve the effect of ensuring integrity

Active Publication Date: 2015-11-25
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF8 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the problem that the existing security protection is difficult to defend against malicious threats aimed at cloud hosts such as "GuestOS image tampering", "host tenant attack" and "virtual machine tampering", the present invention provides a virtualization-based credible The construction method of the server trust chain ensures the integrity, confidentiality and availability of the cloud host system in data processing and business operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualization-based credible server trust chain construction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in conjunction with the accompanying drawings.

[0020] A trusted server trust chain system based on virtualization, with the TPM security chip on the main board of the server as the root of trust, and VMM as the Xen platform, including trusted hardware layer, trusted virtualization layer, trusted OS layer and management platform;

[0021] Trusted hardware layer: Based on the TPM security chip, the trust chain from server power-on to OS startup is constructed by using BIOS, boot operating system OSLoader and TBoot components for trusted detection.

[0022] Trusted virtualization layer: including the server and management side, statically measure the VMM, VM image and files in the VM image through the security module of Xen, such as OSKernel, application layer measurement components, etc., and carry out policies and logs on the files under Xen , keys and other management; support centralized management based on B / S architec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtualization-based credible server trust chain construction method, and belongs to the field of server information credibility. The method comprises the steps that characteristics of a could data center are combined, a credible server is used as a foundation, link firmware, a virtual host, a virtual operation system and a hardware and software integrated trust chain of an upper layer application are constructed, and integrity, confidentiality and availability of a cloud host system in data processing and service operation are ensured.

Description

technical field [0001] The invention discloses a method for constructing a trust chain of a trusted server, which belongs to the field of trustworthy construction of server information, and specifically relates to a method for constructing a trust chain of a trusted server based on virtualization. Background technique [0002] With the continuous deepening of the application of cloud technology, the construction of cloud data center has become the consensus of enterprise IT development. Since the cloud data center carries a large amount of key business data of the enterprise, the importance of security is extraordinary; and due to the openness and complexity of cloud technology, the security challenges faced by the cloud data center are more severe than those of the traditional data center. Advanced Persistent Threats (APT) aiming at stealing corporate confidential data and intelligence, target cloud hosts with a large amount of business-critical data, steal data in a long-t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/57
Inventor 赵媛
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products