期刊文献+

基于分片的云虚拟机安全保护技术

Security Protection Technology based on Piecewise Cloud Virtual Machine
在线阅读 下载PDF
导出
摘要 在典型的Iaa S云中,用户使用云服务需要通过虚拟机实现。最近有研究表明,在大多数常用的加密协议(如SSL/TLS等)中,至关重要的加密密钥,可能被攻击者通过跨虚拟机的旁路攻击截获。针对这种攻击方式,提出了一种云虚拟机密钥保护系统,通过将加密密钥随机分割为多个分片,并将每个分片存储于不同的虚拟机中,能有效保护云中的加密密钥,抵御各类跨虚拟机的旁路攻击。此外,云虚拟机密钥保护系统会周期性地对加密密钥进行重新分割,即便攻击者能够截获局部的加密密钥,也无法进行还原。将云虚拟机密钥保护系统作为一种对应用软件透明的扩展库,运行在亚马逊EC2云的web服务器,取得了较好的成果。 In a typical IaaS (Infrastructure-as-a-Service) cloud, the user would acquire cloud services via executing VM (Virtual Machines). However, recent studies indicate that the crypto keys, as the most cruci- al component in the usually-used cryptographic protocols ( e. g. , SSL/TLS), may be extracted by using cross-VM side-channel attacks. To defeat such a threat, this paper proposes a new system for protecting the crypto key of cloud VM. By simply partitioning the crypto key into multiple random shares and storing each share in different VMs, the crypto key in the cloud could be effectively protected, and the cross-VM side- channel attack be resisted. In addition, this crypto-key protection system of cloud VM may periodically re- partition the crypto key, thus the attacker could not re-construct the key, even acquires partial key, This key protection system of cloud VM is taken as a library extension transparent to the application software and applied to the web server of Amazon EC2 cloud. Experiment indicates an excellent result.
出处 《通信技术》 2015年第6期734-739,共6页 Communications Technology
关键词 虚拟机 密钥分割 VM key partitioning cloud
  • 相关文献

参考文献7

  • 1Ristenpart T, Tromer E, Sbacham H, et al. Hey, You, Get off of My Cloud : Exploring Information I:akage in Third- Party Compute Clouds [J]. In Proceedings of the 16th ACM Conference on Computer and Communications Seeurity, ACM, 2009, 51(1):199-212.
  • 2ZHANG Y, JUELS A, REITER M, et al. Cross-VM Side Channels and Their Use to Extract Private Keys [ J ]. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, ACM, 2012, 51 ( 1 ) : 305-316.
  • 3闫鸿滨.网络密钥管理关键技术研究[J].计算机应用与软件,2011,28(12):68-70. 被引量:3
  • 4Frankel Y. A Practical Protocol for Large Group Oriented Networks [ JT. In Advances in Cryptology EUROCRYPT 1989 Springer, 1990,1 ( 343 ) :56-61.
  • 5Shoup V. Practical Threshold Signatures [ J ]. Advances in Cryptology EUROCRYPT 2000 Springer, 2000, 1 (1807) : 207-220.
  • 6何映伟,邓小艳,吉庆兵.一种混合密码体制下的密钥管理方案[J].通信技术,2012,45(1):122-124. 被引量:4
  • 7范园利,焦占亚.基于密钥分解理论的文件安全分割算法[J].计算机工程与设计,2008,29(2):315-317. 被引量:2

二级参考文献17

  • 1刘海峰,焦占亚,马令坤.数值密钥分解算法的研究与实现[J].计算机工程与应用,2004,40(19):78-81. 被引量:2
  • 2李益发,韩臻,赵亚群,沈昌祥.CPK的安全性分析及其与PKI的比较[J].武汉大学学报(理学版),2004,50(A01):197-200. 被引量:2
  • 3赵小伟,王绍斌.基于标识算法的密钥管理体系和CPK认证[J].信息安全与通信保密,2007,29(6):200-202. 被引量:7
  • 4Song B, Kim K. Two-pass authenticated key agreement protocol with key confirmation. 2000:237 - 249.
  • 5闰鸿滨.密钥托管系统的研究与设计[D].成都:四川师范大学,2006.
  • 6Hoffstein J,Pipher J, Silveman J H. NTRU.A Ring Based Public Key Cryptosystem [ C ]//Proc, Algorithmic Number Theory: Third Int'l Symq. ( ANTS 3 ). 1998:267 -288.
  • 7贺营.NTRU公钥密码体制研究及其在WLAN中的应用设计[D].成都:西南交通大学,2006.
  • 8STINSON D R.Cryptography Theory and Practice(Second Edition)[M].London:CRC Press,2003.
  • 9.系列器件手册[Z].Altera公司,2003..
  • 10严蔚敏,吴伟民.数据结构[M].2版.北京:清华大学出版社,2002.16-18.

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部