Enhancing Endpoint Trusted Connect Using Lightweight Virtualization

Article Preview

Abstract:

With the computer technology boomingly developing and the internet applications gradually spreading all over the world, more and more requirements of endpoint user acquires all kinds of resources via different security level networks. TCG provides approaches to prevent endpoint device from being ruined. However, more NARs on a single physical platform handle connections to different networks which lead to security problems, due to tightly coupled of NARs. In this paper, a lightweight trusted connect framework based hardware-level virtualization is proposed. And we illustrate core implement with improved KVM.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

165-170

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Guidry D, Burmester M, Liu X, et al. A Trusted Computing Architecture for Secure Substation Automation[M]/Critical Information Infrastructures Security. Springer Berlin Heidelberg, 2013: 130-142.

DOI: 10.1007/978-3-642-41485-5_12

Google Scholar

[2] Trusted Computing Group, TCG Specification Architecture Overview, Revision 1. 3, March (2007).

Google Scholar

[3] Grawrock D. TCG Specification Architecture Overview Revision 1. 4[J]. 2007—10—01]. https: /www. trustedcomputinggroup. org/gr0ups/TCG. 1. 4. Architecture. Overview. pdf, (2007).

Google Scholar

[4] Modi C, Patel D, Borisaniya B, et al. A survey of intrusion detection techniques in cloud[J]. Journal of Network and Computer Applications, 2013, 36(1): 42-57.

DOI: 10.1016/j.jnca.2012.05.003

Google Scholar

[5] YANG J,SHINEFERENCEO K G. Using hypervisor to provide datasecrecy for user applications on a per- page basis[C] /Proc of the 4thACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. Seattle: ACM,2008: 71-80.

DOI: 10.1145/1346256.1346267

Google Scholar

[6] Sabahi F. Secure Virtualization for Cloud Environment Using Hypervisor-based Technology[J]. Int. Journal of Machine Learning and Computing, 2012, 2(1).

DOI: 10.7763/ijmlc.2012.v2.87

Google Scholar

[7] Che J, Yu Y, Shi C, et al. A synthetical performance evaluation of openvz, xen and kvm[C]/Services Computing Conference (APSCC), 2010 IEEE Asia-Pacific. IEEE, 2010: 587-594.

DOI: 10.1109/apscc.2010.83

Google Scholar

[8] Qumranet Inc.KVM:Kernel-based Virtual Machine. http: /kvm. sourceforge. net.

Google Scholar