【24h】

Secure Attestation of Virtualized Environments

机译:确保虚拟化环境的证明

获取原文
获取外文期刊封面目录资料

摘要

Securing the integrity of virtualized environments like clouds is challenging yet feasible. Operators have discovered the advantages of virtualization technology in terms of flexibility, scalability, cost-effectiveness, and availability. Applications range from network and embedded devices to big data centers and cloud computing. Trusted Computing technology can be employed to protect the integrity of a system by leveraging a Trusted Platform Module (TPM) and remote attestation. Existing research on remote attestation of virtualized environments differs in scalability, resource consumption, and provided security guarantees. While some approaches scale at large and use the TPM efficiently, they are way more intrusive, requiring changes to hypervisor and Virtual Machine (VMs). Others render entirely impractical with an increasing number of VMs, caused by the TPM being the bottleneck. In this paper we analyze existing work on remote attestation for virtualized environments and discuss benefits as well as shortcomings. We identify an approach that provides adequate security and is easy to implement but is prone to relay attacks. We improve that approach by developing countermeasures, while maintaining existing security guarantees. Our contribution requires only minimal changes to the hypervisor system, keeping existing attestation protocols intact. We implement and evaluate on production-grade hardware, and compare our improved attestation approach with the most sophisticated alternative approach. With performance measurements and further evaluations we show that our solution outperforms the other approach for a small number of VMs, as used in network devices and embedded systems.
机译:保护像云等虚拟化环境的完整性是挑战性的,但却是可行的。在灵活性,可扩展性,成本效益和可用性方面,运营商已经发现了虚拟化技术的优势。应用范围从网络和嵌入式设备到大数据中心和云计算。可以使用可信计算技术来保护系统的完整性来通过利用可信平台模块(TPM)和远程证明来保护系统的完整性。关于虚拟化环境的远程证实的现有研究在可伸缩性,资源消耗和安全保证方面不同。虽然某些方法大规模并有效地使用TPM,但它们是更具侵扰性的,需要更改虚拟机管理程序和虚拟机(VM)。其他人因越来越多的VM而完全不切实际,由TPM是瓶颈引起的。在本文中,我们分析了对虚拟化环境的远程证明的现有工作,并讨论了福利以及缺点。我们确定一种提供足够安全性的方法,并且易于实施,但容易发生中继攻击。我们通过制定对策来提高这种方法,同时保持现有的安全保障。我们的贡献只需要对管理程序系统的最小变化,保持现有的证明协议完好无损。我们在生产级硬件上实施和评估,并与最先进的替代方法进行比较了我们改进的认证方法。具有性能测量和进一步的评估,我们表明我们的解决方案优于少量VM的其他方法,如网络设备和嵌入式系统所使用的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号