期刊文献+

一种基于Xen的TPM访问控制改进方法

An Improved Method of TPM Access Control Based on Xen
在线阅读 下载PDF
导出
摘要 针对可信平台模块(TPM)访问受重放攻击和替换攻击威胁的问题,提出一种改进的TPM访问控制方法.首先建立TPM长期访问控制功能,通过创建额外授权数据以保证进程结束后继续授权会话,同时将TPM地址与Domain U的身份标识号相关联,以保护其地址免受替换攻击.其次,建立TPM所有权共享功能,允许多个DomainU使用相同的TPM地址并防止死锁,因共享地址不能被重写,可保护敏感数据免受攻击.最后基于Xen实现了该方法并评估了其性能.实验结果证明了该方法的可行性和有效性,TPM访问性能开销在可接受的范围内. Aimed at solving the problem that TPM access was threatened by attacks such as replay attack and substitution attack,an improved method of TPM access control was proposed.First,TPM long term access control function was established.Extra authorization data was created to continue authorization session after finishing the process.Meanwhile,TPM address was related with an ID of Domain U to protect TPM address form substitution attack.Then,TPM shared ownership function was established,allowing plural Domain Us to use the same TPM address and preventing from the deadlock.Sensitive data was protected against attack because shared address was not rewritable.Finally,this method was implemented based on Xen and its performance was evaluated.Experiments results verified the feasibility and the effectiveness of this method and the overhead of TPM access was within the acceptable range.
作者 季涛 李永忠
出处 《微电子学与计算机》 CSCD 北大核心 2012年第11期152-156,共5页 Microelectronics & Computer
基金 江苏省高校自然科学基金项目(05KJD52006) 江苏省研究生培养创新工程(CXZZ12_0722) 江苏科技大学科研项目(2005DX006J)
关键词 可信平台模块 访问控制 授权 虚拟机 XEN trusted platform module access control authorization virtual machine Xen
  • 相关文献

参考文献10

  • 1SHEN ChangXiang,ZHANG HuanGuo,WANG HuaiMin,WANG Ji,ZHAO Bo,YAN Fei,YU FaJiang,ZHANG LiQiang,XU MingDi.Research on trusted computing and its development[J].Science China(Information Sciences),2010,53(3):405-433. 被引量:39
  • 2Chen Haiho, Chen Jieyun, Mao Wenbo, et al. Daonity-Grid security from two levels of virtualization[J].Information Security Technical Report. 2007,12 (3) : 123-138.
  • 3Carl A W. Memory resource management in VMwareESX server[C] // Proceedings of the 5 th symposium onOperating systems design and implementation. NewYork: ACM Press,2002 : 181-194.
  • 4Zhang Xiaolan,Suzanne M, Pankaj R, et al. Xen-Socket : A high-throughput interdomain transport forVMs[C] // Proceedings of the ACM/IFIP/USENIX2007 International Conference on Middleware. NewYork: Springer-Verlag,2007 : 184-203.
  • 5Todd D,Zachary S, Jeanna N M,et al. Quantitativecomparison of Xen and KVM[C] // In Xen Summit.Boston: USENIX Association, 2008 : 1-2.
  • 6顾韵华,李丹,陈玮.基于认证可信度的角色访问控制模型[J].微电子学与计算机,2009,26(7):5-8. 被引量:3
  • 7秦宇,兰海波.TPM虚拟域安全模型[J].中国科学院研究生院学报,2011,28(5):648-658. 被引量:2
  • 8England P, Loeser J. Para-virtualized TPM sharing[C]// Proceedings of the 1st International Conferenceon Trusted Computing and Trust in Information Tech-nologies; Trusted Computing-Challenges and Applica-tions. Berlin: Springer-Verla, 2009 : 119-132.
  • 9Matthias B,Michael S,Georg B,et al. Non-intrusivevirtualization management using libvirt[C] // Proceed-ings of the Conference on Design,Automation andTest in Europe. Belgium: ACM Press, 2010: 574-579.
  • 10Shane B, Eimear G, Chris J M, et al. Challenges fortrusted computing [J]. IEEE Security and Privacy,2008,6(6):60-66.

二级参考文献36

  • 1黄强,沈昌祥,陈幼雷,方艳湘.基于可信计算的保密和完整性统一安全策略[J].计算机工程与应用,2006,42(10):15-18. 被引量:27
  • 2陈平,孙宏伟,顾明.基于指纹识别和智能卡的安全电子报税系统[J].计算机应用研究,2007,24(2):134-137. 被引量:2
  • 3陆汝钤.人工智能[M].北京:科学出版社,2002.823-843.
  • 4Loscocoo P A,Smalley S D. The inevitability of failure: the flawed assumption of security in modern computing environments[C]//Proc of the 21st National Information Systems Security Conefrence. Chicago, 1998:303- 314.
  • 5Sandhu R S, Coyne E J, Feinstein H L, et al. Role - based access control models[ J ]. IEEE Computer, 1996,29 (2) : 38 - 47.
  • 6Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation[C/OL]//Proc of the 36th Hawaii International Conference on System Sciences, Hawaii, 2002. [ 2008 - 06 - 06 ]. http://csdl.computer. org/comp/proceedings/hicss/2002/1435/07/14350188.pdf.
  • 7冀汶莉.基于RBAC模型的权限管理系统的研究与应用[J].微电子学与计算机,2007,24(8):86-88. 被引量:20
  • 8Trusted Computing Group. TPM main part 1, design principles specification, version 1.2 revision 62 [ EB/OL] (2003-10)[ 2010-08-15 ] https ://www. trustedcomputinggroup, org/home.
  • 9Trusted Computing Group. TCG software stack (TSS) specification, version 1. 10 [ EB/OL 1- ( 2003 ) [ 2010-08-20 ] https: //www. trustedcomputinggroup, org.
  • 10Trusted Computing Group. TCG trusted network connect, TNC architecture for interoperability specification version 1.0 revision 4,3 [ EB/ OL ]. ( 2005-05 ) [ 2010-08-20 ] https ://www. trustedcomputinggroup, org/home.

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部