Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for verifying virtual trusted root in cloud environment

A verification method and root-of-trust technology, which is applied in the field of cloud computing, can solve problems such as user data destruction, cloud management platform cannot know in time, virtual root of trust cannot be known, and achieve the effect of preventing private data from being destroyed

Active Publication Date: 2020-04-10
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The virtual root of trust stores sensitive information such as the key of the virtual machine user. Once the virtual root of trust is replaced by a malicious attacker, when the virtual machine user encrypts and decrypts private data using the replaced virtual root of trust, the private data may be compromised. destroyed
[0004] At present, the virtual root of trust verification function has not been integrated in the cloud management platform. Virtual machines only use the virtual root of trust. The cloud management platform cannot know whether the virtual root of trust is issued by a known issuer. Once the virtual root of trust is Replacement, the virtual root of trust will run normally, but the cloud management platform cannot know in time, and user data is in danger of being destroyed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for verifying virtual trusted root in cloud environment
  • Method and system for verifying virtual trusted root in cloud environment
  • Method and system for verifying virtual trusted root in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0045] The steps shown in the flowcharts of the figures may be performed in a computer system, such as a set of computer-executable instructions. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0046] figure 1 It is a flowchart of a verification method for a virtual root of trust in a cloud environment according to an embodiment of the present invention, as figure 1 As shown, the method of the embodiment of the present invention includes the fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and a system for verifying a virtual trusted root in a cloud environment, and the method comprises the steps: verifying the identity of the virtual trusted root through a cloud management platform when a virtual machine loads and operates the trusted root each time; and the virtual machine selects whether to continue to load and run the virtual trusted root according to the verification result of the cloud management platform. According to the method of the invention, the virtual trusted root verification function can be integrated in the cloud management platform, so that the private data is prevented from being damaged due to the use of the virtual trusted root by subsequent programs.

Description

technical field [0001] The invention relates to cloud computing technology, in particular to a method and system for verifying a virtual root of trust in a cloud environment. Background technique [0002] Information security has become a key factor restricting the application and development of cloud computing. Among them, the security of cloud data center infrastructure, the integrity of data and information of cloud data center virtual machine tenants, and the trust between cloud service providers and cloud service tenants are important factors. To improve the key foundation of cloud security, the solution to these problems needs to start from the underlying hardware of the computer and start from the architecture. Trusted computing, as a security technology that starts from the hardware platform and architecture to solve the information security of computing platforms, has become a key technical means to improve the security of cloud data center infrastructure and the tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455G06F21/57G06F21/62
CPCG06F9/45558G06F21/6245G06F21/57
Inventor 许鑫
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More