Proceedings of the 2nd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2017)

Research and Design of Virtual Machine Based on User Trusted Security Strategy

Authors
Qichao Yang, Rongyu He, Lichen Shi
Corresponding Author
Qichao Yang
Available Online May 2017.
DOI
10.2991/icmeit-17.2017.94How to use a DOI?
Keywords
Trusted cloud platform, the trust-source integration, User configurable, integrity measurement.
Abstract

Cloud users want to get a full control of the virtual computing resources in a cloud platform, a trusted cloud computing technology provides a reliable measure in the root for the cloud platform, but it couldn't provide fine-grained credible support services, and can't meet the demand of users the flexibility of security policies, aiming at the problem, we introduce LCTVM model to construct a virtual TPM for user, to achieve the user's security configuration by building TPM_Admin component effective load of the strategy, We design the VTRAP agreement to ensure that the user and session key between TPM Admin in negotiation, and verify its attacks in the state of effective security. This article formulated the strategy table user program security levels to meet user personalized security requirements, through the establishment of trust based on the platform and the user's dual source virtual trusted root, effective integration platform for trust and user trust. Validation and analysis show that this design of user-oriented trusted virtual machine can provide not only meet the demand of multi-user credible measures guarantee, and can realize the user customized security policies customized

Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2nd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2017)
Series
Advances in Computer Science Research
Publication Date
May 2017
ISBN
978-94-6252-338-8
ISSN
2352-538X
DOI
10.2991/icmeit-17.2017.94How to use a DOI?
Copyright
© 2017, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Qichao Yang
AU  - Rongyu He
AU  - Lichen Shi
PY  - 2017/05
DA  - 2017/05
TI  - Research and Design of Virtual Machine Based on User Trusted Security Strategy
BT  - Proceedings of the 2nd International Conference on Mechatronics Engineering and Information Technology (ICMEIT 2017)
PB  - Atlantis Press
SP  - 499
EP  - 506
SN  - 2352-538X
UR  - https://doi.org/10.2991/icmeit-17.2017.94
DO  - 10.2991/icmeit-17.2017.94
ID  - Yang2017/05
ER  -