CN109783192A - A kind of secure virtual machine migratory system - Google Patents

A kind of secure virtual machine migratory system Download PDF

Info

Publication number
CN109783192A
CN109783192A CN201811548224.0A CN201811548224A CN109783192A CN 109783192 A CN109783192 A CN 109783192A CN 201811548224 A CN201811548224 A CN 201811548224A CN 109783192 A CN109783192 A CN 109783192A
Authority
CN
China
Prior art keywords
virtual machine
tpcm
virtual
module
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811548224.0A
Other languages
Chinese (zh)
Inventor
孙瑜
王强
夏攀
王大海
王涛
洪宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Original Assignee
BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd filed Critical BEIJING HUATECH TRUSTED COMPUTING INFORMATION TECHNOLOGY Co Ltd
Priority to CN201811548224.0A priority Critical patent/CN109783192A/en
Publication of CN109783192A publication Critical patent/CN109783192A/en
Pending legal-status Critical Current

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to a kind of secure virtual machine migratory systems; including Cloud Server hardware environment, host machine system, virtual machine monitor and one or more virtual machine instances; it wherein include local security migration engine in host machine system; the local security migration engine includes key negotiation module, remote proving module, Confidentiality protection module, integrity protection module and virtual TPCM life cycle management module, through the invention in secure virtual machine migratory system safety transfer of the virtual machine between source node and target may be implemented.

Description

A kind of secure virtual machine migratory system
Technical field
The present invention relates to virtual cloud security fields, and in particular to a kind of secure virtual machine migratory system.
Background technique
Cloud computing technology is grown rapidly now, has become the research hotspot of domestic and international internet industry.As a kind of new Type calculates mode, it is using resource rental, application hosting, service outsourcing as core, using IT resource, data, using logical as service It crosses internet and is supplied to cloud tenant.
Most worthy is dynamic migration of virtual machine technology in cloud computing.Dynamic migration of virtual machine technology can keep empty While quasi- machine operation, it is moved to purpose physical machine from a source physical machine, and resume operation in purpose physical machine, from And guaranteeing transition process is transparent to user.Moreover, the dynamic load of server may be implemented in dynamic migration of virtual machine technology Balanced and on-line maintenance, and provide a kind of perspective fault-tolerant networks.Currently, the research for dynamic migration of virtual machine technology is big Mostly it is the research to transport efficiency, such as shortens transit time, fast transferring, reduces the amount of migration, to exists in transition process Study on Safety Problem is less.And in actual cloud computing environment, often there is a large amount of security threat and needs to further investigate simultaneously It is proposed reasonable solution.Its problem specifically includes that the fragility of data transmission channel, i.e., migrating data is in no any guarantor In the case where shield, the attack of passive listening and active control may be subjected to;For the attack of VMM, attacker may be used The attack patterns such as network cheating and Replay Attack, when lacking access control, attacker can kidnap the control of VMM, arbitrarily It initiates virtual machine (vm) migration and controls Client OS;For the attack of transferring module, moving for virtual machine (vm) migration is realized in VMM Loophole in shifting formwork block will lead to VMM and client computer OS by the destruction of attacker.
Summary of the invention
For the above-mentioned problems in the prior art, the invention proposes a kind of secure virtual machine migratory systems, meet Platform authentication, data transmission protection, the protection of virtual credible root atomicity and VM- virtual TPCM security association four safety need It asks.
The invention proposes a kind of secure virtual machine migratory systems characterized by comprising
Cloud Server hardware environment, the Cloud Server hardware environment include hardware TPCM chip;
Host machine system includes local security migration engine in the host machine system;
Virtual machine monitor includes virtual TPCM backend driver in the virtual machine monitor, loads virtual TPCM Example executes actively monitoring to virtual machine and actively measures;
One or more virtual machine instances, one or more of virtual machine instances are managed by the virtual machine monitor is unified It manages, includes a trusted software base in each virtual machine instance, measurement, control are executed to virtual machine by the trusted software base And decision.
Preferably, the system also includes:
The hardware TPCM chip and host machine system constitute dual system architecture, preferentially power on before system operation Starting carries out active safety measurement to system.
Preferably, the local security migration engine includes:
Key negotiation module, remote proving module, Confidentiality protection module, integrity protection module and virtual TPCM life Cycle management module.
Preferably, the system also includes:
The key negotiation module uses friendship by tls handshake protocol in the handshake procedure of source node and destination node Change information and calculate separately and obtain two symmetric keys --- Kenc and Kmac.
Preferably, the system also includes:
The remote proving module proves the integrality of target platform.
Preferably, the system also includes:
Kenc that the Confidentiality protection module and the integrity protection module call key negotiation module to obtain and Kmac key carries out encryption and decryption and completeness check to the data flow of transmission.
Preferably, the system also includes:
If completeness check success, the completeness check module of target platform can return to ATT_SUCCESS notice, failure ATT_FAILED is then returned, session is interrupted.
Preferably, the system also includes:
For the virtual machine TPCM life cycle management module during virtual machine (vm) migration, the TPCM deleted in source node is real Example creates the TPCM example of duplicate plate according to the TPCM example in source node in destination node.
Preferably, the system also includes:
The virtual machine TPCM life cycle management module is packaged the virtual TPCM example in source node;
Destination node is sent by the virtual TPCM example after encapsulation;
The destination node regenerates new virtual TPCM example according to the virtual TPCM example.
The invention proposes a kind of secure virtual machine migratory systems, guarantee virtual machine in source node by quadruple security mechanism Safety transfer between destination node: first, key agreement and remote proving module realize the flat of virtual machine (vm) migration process It is authenticated between platform;Second, the session key that Confidentiality protection module and integrity protection module are obtained using key negotiation module, Transmission data are carried out adding solution and completeness check, ensure that and construct safe communication channel between source platform and target platform; Third, virtual TPCM life cycle management module learn virtual machine (vm) migration to target platform, the starting of schedule virtual TPCM manager Virtual TPCM example carries out actively monitoring to virtual machine and actively measures, and completes the bindings of the virtual TPCM of VM-, ensure that The security association of the virtual TPCM of VM-;4th, the virtual virtual TPCM manager of TPCM life cycle management module schedules is completed virtual The operation such as creation, deletion of TPCM example, ensure that in transition process will not lose virtual TPCM example because of migration failure, It will not be completed because of migration, occur old not deleted virtual TPCM example copy in source platform, virtually may be used to ensure that Believe the atomicity of root.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
Fig. 1 is XEN virtual machine (vm) migration system architecture diagram in the prior art;
Fig. 2 is one of the embodiment of the present invention one secure virtual machine migratory system architecture diagram;
Fig. 3 is the local security migration engine comprising modules figure in the embodiment of the present invention two;
Fig. 4 is one of the embodiment of the present invention three secure virtual machine moving method flow chart.
Specific embodiment
Now in conjunction with attached drawing, elaborate to presently preferred embodiments of the present invention.
XEN dynamic migration of virtual machine system is as shown in Figure 1, it includes four basic modules in the prior art: migration is monitored Module runs transferring module, freezes module and target platform wake-up module.The major functions of each module are as follows:
Monitor transferring module: monitor transferring module major function be determination to carry out virtual machine (vm) migration virtual machine it is real The problems such as example, transit time, the target platform moved to.
Operation transferring module: operation transferring module mainly monitors and the entire virtual machine (vm) migration process of control.The module is whole The key of a virtual machine (vm) migration will have a direct impact on migration elapsed time and downtime.It receives the signal from transferring module, If necessary to migrate, collects source platform and relevant operation information and package information is labeled as domain.Then and freeze module progress Communication, and then source platform execution is freezed to instruct, freeze source platform.When target platform obtains the shape of virtual machine operation in source platform After state information, which initiates wake-up signal, the virtual machine instance of wake up target server.
Freeze module: freezing module for the virtual machine to source platform and target platform and execute freeze operation, i.e. virtual machine It shuts down.Integrality, consistency and the continuity of service, downtime in order to guarantee data is very of short duration.
Wake-up module: target platform obtains in source platform after the status information of virtual machine operation, so that it may by source platform On virtual machine delete, while the virtual machine instance on wake up target platform guarantees the integrality of migration.
Embodiment one
Existing virtual machine (vm) migration system does not have the platform authentication of virtual machine (vm) migration, it cannot be guaranteed that the source of virtual machine (vm) migration is flat The status safety of platform and target platform is credible.Lack data transmission protection simultaneously, appearance during virtual machine (vm) migration can not be handled Man-in-the-middle attack etc. threaten.
For defect existing for existing virtual machine (vm) migration system, present embodiment discloses a kind of migrations of secure virtual machine to be System, system framework figure is as shown in Fig. 2, include that Cloud Server hardware environment, host machine system, virtual machine monitor and virtual machine are real Example:
Wherein, the hardware TPCM chip of bottom hardware environment provides the cryptographic service of trust computing for system, and TPCM and host machine system constitute the credible 3.0 dual system architectures proposed, provide actively monitoring for system and actively measure Mechanism is powered up starting, supervisory control system running environment, the safety of safeguards system prior to system.
Wherein, host machine system includes trusted software base (TSB).It is all local to placed offer management in trusted software base Core --- the local security migration engine of virtual the TPCM manager and secure virtual machine shift function of virtual TPCM example, two Person can call the trust computing resource of bottom TPCM to complete corresponding migration or virtual credible root management function.Virtual TPCM Manager manages access of the upper layer to virtual TPCM example, the access according to upper layer to virtual TPCM as a service routine Situation dispatches the trust computing resource of the TPCM of bottom hardware environment, manages importing and exporting for virtual TPCM context, and provide New virtual TPCM example creation and virtual TPCM shift function.
Wherein, the upper layer of host machine system is virtual machine monitor VMM, includes virtual TPCM backend driver in VMM, The virtual TPCM context instance provided for loading virtual TPCM manager, to corresponding virtual machine offer active monitoring and actively The functions such as measurement.
Wherein, the top layer of system is the virtual machine instance being managed collectively by VMM, includes one in each virtual machine instance The trusted software base of a virtual machine, provides tolerance mechanism, controlling mechanism and decision mechanism of virtual machine etc..
Embodiment two
The local security migration engine in above-mentioned secure virtual machine migratory system will be described in detail in the present embodiment, As shown in figure 3, the safety transfer engine includes key agreement, remote proving, Confidentiality protection, integrity protection and virtual Five modules of TPCM life cycle management, are described in detail below the function of each module:
(1) key negotiation module
Key negotiation module is used for source platform and target platform mutual identity authentication, and negotiates for protecting subsequent number According to the key of the confidentiality and integrity of exchange, that is, provide the Confidentiality protection module and integrity protection mould of local migration engine The key of block.Key negotiation module generates two symmetric keys --- Kenc and Kmac, the two keys by tls handshake protocol It is to calculate separately out using the information of exchange during the handshake process by source and target platform.
(2) remote proving module
Remote proving module is used to verify the integrity certification of target platform.Remote proving module uses key negotiation module Obtained encryption key Kenc and integrity check key Kmac.
Remote proving module main working process is as follows:
A) source platform generates random number N s, is sent to target platform together with remote proving request ATT_REQ
B) target platform carries out completeness check to information, and calls the authentication key A IK of bottom TPCM to PCR value It signs with the Ns received, information after signature is sent to source platform together with metrics logs SML
C) contents such as integrality of source platform verifying target platform determine that migration continues or issue to interrupt session Instruction.
(3) Confidentiality protection module and integrity protection module
Confidentiality protection module and integrity protection module are used to the safety of transmission data during virtual machine (vm) migration Protection, protection data include two parts: the relevant information of source platform virtual machine information and corresponding virtual TPCM example.Confidentiality Kenc the and Kmac key that protective module and integrity protection module can call key negotiation module to obtain, to the data flow of transmission Carry out encryption and decryption and completeness check work.Completeness check success, then the completeness check module of target platform can return ATT_SUCCESS notice, failure then return to ATT_FAILED, interrupt session.
(4) virtual TPCM life cycle management module
Virtual TPCM life cycle management module is for initiating the virtual TPCM example of source platform during virtual machine (vm) migration The creation of delete operation and the virtual TPCM example of target platform operates, and guarantees the atom of virtual TPCM example in transition process Property.
Once initiating migration operation, need transportable key being sent to target platform, by the virtual TPCM of target platform The creation that life cycle management module calls virtual TPCM manager to carry out virtual TPCM example operates.Complete virtual TPCM example Creation after, it is real that the virtual TPCM manager of virtual TPCM life cycle management module invocation target platform starts virtual TPCM Example.When virtual machine (vm) migration to target platform, active monitoring and active are carried out to virtual machine by the virtual TPCM example of target platform Measurement, measurement results are correct, and virtual TPCM and virtual machine are bound, and guarantee the security association of virtual TPCM-VM, and notify void Quasi- TPCM life cycle management module deletes the virtual TPCM example of source platform.
If migration failure, virtual TPCM life cycle management module are called on virtual TPCM manager delete target platform Virtual TPCM.Guarantee the fault recovery of virtual TPCM and prevents to repeat to copy.
A kind of secure virtual machine migratory system proposed in through this embodiment guarantees virtual machine by quadruple security mechanism Safety transfer between source node and destination node: first, key agreement and remote proving module realize virtual machine (vm) migration It is authenticated between the platform of process;Second, what Confidentiality protection module and integrity protection module were obtained using key negotiation module Session key, to transmission data carry out plus solution and completeness check, ensure that constructed between source platform and target platform it is safe Communication channel;Third, virtual TPCM life cycle management module learn virtual machine (vm) migration to target platform, schedule virtual TPCM pipe The virtual TPCM example of device starting is managed to virtual machine progress active monitoring and active measurement, and the binding for completing the virtual TPCM of VM- is grasped Make, ensure that the security association of the virtual TPCM of VM-;4th, the virtual virtual TPCM management of TPCM life cycle management module schedules Device completes the operation such as creation, deletion of virtual TPCM example, and ensure that in transition process will not lose empty because of migration failure Quasi- TPCM example will not be completed because of migration, occur old not deleted virtual TPCM example copy in source platform, to protect The atomicity of virtual credible root is demonstrate,proved.
Embodiment three
Based on the secure virtual machine migratory system in above-mentioned two embodiment, the present embodiment proposes a kind of secure virtual machine Moving method, as shown in figure 4, it migrates process are as follows:
(1) after source platform receives migration signal, target platform address is determined, source platform and target platform are held using TLS Handball Association's view carries out key agreement, obtains two symmetric keys --- Kenc and Kmac.
(2) source platform and target platform verify mesh using the session key that key agreement obtains by remote proving module Mark the integrality of platform.
(3) the virtual TPCM life cycle management module of source platform calls virtual TPCM manager to carry out virtual TPCM example Data encapsulation, virtual TPCM manager call the trust computing resource of bottom TPCM to the virtual TPCM example of virtual machine to be migrated Data complete encapsulation.
(4) source platform sends the virtual TPCM instance data after encapsulation to target platform.
(5) the virtual TPCM life cycle management module of target platform calls virtual TPCM manager to unseal data Dress, and virtual TPCM example is regenerated in target platform using the data, complete the migration of virtual credible root.
(6) target platform, which is sent, confirms signal that virtual TPCM creation is completed to source platform.
(7) source platform receives the signal that virtual TPCM migration is completed, and virtual TPCM life cycle management module notice is virtual TPCM manager deletes local virtual TPCM example copy, and starts virtual machine (vm) migration.
(8) target platform carries out actively monitoring to virtual machine (vm) migration process and actively measures.
(9) when virtual machine (vm) migration is completed and source platform sends virtual TPCM example and deletes notice, virtual TPCM Life Cycle Period management module notifies virtual TPCM manager to enable local vTCPM example, carries out active measurement to virtual machine, if measurement knot Fruit is correct, completes the virtual TPCM binding of VM-, and entire transition process terminates.
One of through this embodiment secure virtual machine moving method, it can be achieved that virtual machine in source node and destination node Between safety transfer, wherein key agreement and remote proving module realize and recognize between the platform of virtual machine (vm) migration process Card;The session key that Confidentiality protection module and integrity protection module are obtained using key negotiation module, to transmission data into Row plus solution and completeness check, ensure that and construct safe communication channel between source platform and target platform;Virtual TPCM life Cycle management module learns virtual machine (vm) migration to target platform, and the virtual TPCM example of schedule virtual TPCM manager starting is to virtual Machine carries out actively monitoring and actively measures, and completes the bindings of the virtual TPCM of VM-, ensure that the safety of the virtual TPCM of VM- Association;The virtual virtual TPCM manager of TPCM life cycle management module schedules completes creation, the deletion etc. of virtual TPCM example Operation, ensure that in transition process will not lose virtual TPCM example because of migration failure, will not complete because of migration, There is old not deleted virtual TPCM example copy in source platform, to ensure that the atomicity and safety of virtual credible root.
In several embodiments provided by the present invention, it should be understood that disclosed method and terminal can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the module, only Only a kind of logical function partition, there may be another division manner in actual implementation.
In addition, the technical solution in above-mentioned several embodiments can be combined with each other and replace in the case where not conflicting It changes.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
It, can also be in addition, each functional module in each embodiment of the present invention can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds software function module.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any attached associated diagram label in claim should not be considered as right involved in limitation to want It asks.Furthermore, it is to be understood that one word of " comprising " does not exclude other units or steps, odd number is not excluded for plural number.It is stated in system claims Multiple modules or device can also be implemented through software or hardware by a module or device.The first, the second equal words It is used to indicate names, and does not indicate any particular order.
Finally it should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although reference Preferred embodiment describes the invention in detail, those skilled in the art should understand that, it can be to of the invention Technical solution is modified or equivalent replacement, without departing from the spirit and scope of the technical solution of the present invention.

Claims (9)

1. a kind of secure virtual machine migratory system characterized by comprising
Cloud Server hardware environment, the Cloud Server hardware environment include hardware TPCM chip;
Host machine system includes local security migration engine in the host machine system;
Virtual machine monitor includes virtual TPCM backend driver in the virtual machine monitor, loads virtual TPCM example Actively monitoring is executed to virtual machine and is actively measured;
One or more virtual machine instances, one or more of virtual machine instances are managed collectively by the virtual machine monitor, In each virtual machine instance include a trusted software base, by the trusted software base to virtual machine executes measurement, control and Decision.
2. secure virtual machine migratory system according to claim 1, which is characterized in that the system also includes:
The hardware TPCM chip and host machine system constitute dual system architecture, preferentially power on and open before system operation It is dynamic, active safety measurement is carried out to system.
3. secure virtual machine migratory system according to claim 1, which is characterized in that the local security migration engine Include:
Key negotiation module, remote proving module, Confidentiality protection module, integrity protection module and virtual TPCM life cycle Management module.
4. secure virtual machine migratory system according to claim 3, which is characterized in that further include:
The key negotiation module uses exchange letter by tls handshake protocol in the handshake procedure of source node and destination node Breath, which calculates separately, obtains two symmetric keys --- Kenc and Kmac.
5. secure virtual machine migratory system according to claim 4, which is characterized in that further include:
The remote proving module proves the integrality of target platform.
6. according to the secure virtual machine migratory system in claim 4, which is characterized in that further include:
The Kenc and Kmac that the Confidentiality protection module and the integrity protection module call key negotiation module to obtain are close Key carries out encryption and decryption and completeness check to the data flow of transmission.
7. secure virtual machine migratory system according to claim 6, which is characterized in that further include:
If completeness check success, the completeness check module of target platform can return to ATT_SUCCESS notice, and failure is then returned ATT_FAILED is returned, session is interrupted.
8. secure virtual machine migratory system according to claim 4, which is characterized in that further include:
The virtual machine TPCM life cycle management module deletes the TPCM example in source node during virtual machine (vm) migration, The TPCM example of duplicate plate is created in destination node according to the TPCM example in source node.
9. secure virtual machine migratory system according to claim 8, which is characterized in that further include:
The virtual machine TPCM life cycle management module is packaged the virtual TPCM example in source node;
Destination node is sent by the virtual TPCM example after encapsulation;
The destination node regenerates new virtual TPCM example according to the virtual TPCM example.
CN201811548224.0A 2018-12-18 2018-12-18 A kind of secure virtual machine migratory system Pending CN109783192A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811548224.0A CN109783192A (en) 2018-12-18 2018-12-18 A kind of secure virtual machine migratory system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811548224.0A CN109783192A (en) 2018-12-18 2018-12-18 A kind of secure virtual machine migratory system

Publications (1)

Publication Number Publication Date
CN109783192A true CN109783192A (en) 2019-05-21

Family

ID=66497220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811548224.0A Pending CN109783192A (en) 2018-12-18 2018-12-18 A kind of secure virtual machine migratory system

Country Status (1)

Country Link
CN (1) CN109783192A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111158906A (en) * 2019-12-19 2020-05-15 北京可信华泰信息技术有限公司 Credible cloud system for active immunization
CN111158854A (en) * 2019-12-19 2020-05-15 北京可信华泰信息技术有限公司 Method for recovering trust chain during migration of cloud environment virtual machine
CN111600775A (en) * 2020-05-15 2020-08-28 苏州浪潮智能科技有限公司 Security testing method, device, equipment and medium for cluster encryption migration
CN112328358A (en) * 2020-10-28 2021-02-05 惠州华阳通用电子有限公司 Dual-system starting method based on virtual machine and storage medium
CN112860380A (en) * 2021-03-04 2021-05-28 中国科学院信息工程研究所 Virtual machine trusted migration method based on built-in security chip
CN112882799A (en) * 2021-03-04 2021-06-01 中国科学院信息工程研究所 Virtual machine trusted migration system based on built-in security chip
CN112883369A (en) * 2021-03-25 2021-06-01 中国科学院信息工程研究所 Credible virtualization system
US11354207B2 (en) 2020-03-18 2022-06-07 Red Hat, Inc. Live process migration in response to real-time performance-based metrics
US11411969B2 (en) 2019-11-25 2022-08-09 Red Hat, Inc. Live process migration in conjunction with electronic security attacks
CN114938275A (en) * 2022-07-21 2022-08-23 国开启科量子技术(北京)有限公司 Method, apparatus, medium, and device for migrating virtual machine using quantum key
CN115189928A (en) * 2022-06-25 2022-10-14 中国人民解放军战略支援部队信息工程大学 Dynamic safe migration method and system for password service virtual machine

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204964A1 (en) * 2007-10-12 2009-08-13 Foley Peter F Distributed trusted virtualization platform
CN101515316A (en) * 2008-02-19 2009-08-26 北京工业大学 Trusted computing terminal and trusted computing method
CN102136043A (en) * 2010-01-22 2011-07-27 中国长城计算机深圳股份有限公司 Computer system and measuring method thereof
CN103812862A (en) * 2014-01-23 2014-05-21 厦门密安信息技术有限责任公司 Dependable security cloud computing composition method
CN107301082A (en) * 2016-04-15 2017-10-27 中兴通讯股份有限公司 A kind of method and apparatus for realizing operating system integrity protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204964A1 (en) * 2007-10-12 2009-08-13 Foley Peter F Distributed trusted virtualization platform
CN101515316A (en) * 2008-02-19 2009-08-26 北京工业大学 Trusted computing terminal and trusted computing method
CN102136043A (en) * 2010-01-22 2011-07-27 中国长城计算机深圳股份有限公司 Computer system and measuring method thereof
CN103812862A (en) * 2014-01-23 2014-05-21 厦门密安信息技术有限责任公司 Dependable security cloud computing composition method
CN107301082A (en) * 2016-04-15 2017-10-27 中兴通讯股份有限公司 A kind of method and apparatus for realizing operating system integrity protection

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
于颖超等: ""一种安全VM-vTPM迁移协议的设计与实现"", 《电子科技应用》 *
刘凯: ""面向云安全的虚拟域可信根的设计与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
张建标等: ""面向云环境的虚拟机可信迁移方案"", 《网络与信息安全学报》 *
张建标等: ""面向云计算环境的vTPCM可信管理方案"", 《信息网络安全》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11411969B2 (en) 2019-11-25 2022-08-09 Red Hat, Inc. Live process migration in conjunction with electronic security attacks
CN111158854A (en) * 2019-12-19 2020-05-15 北京可信华泰信息技术有限公司 Method for recovering trust chain during migration of cloud environment virtual machine
CN111158906A (en) * 2019-12-19 2020-05-15 北京可信华泰信息技术有限公司 Credible cloud system for active immunization
CN111158906B (en) * 2019-12-19 2023-04-28 北京可信华泰信息技术有限公司 Active immunity credible cloud system
US11354207B2 (en) 2020-03-18 2022-06-07 Red Hat, Inc. Live process migration in response to real-time performance-based metrics
CN111600775A (en) * 2020-05-15 2020-08-28 苏州浪潮智能科技有限公司 Security testing method, device, equipment and medium for cluster encryption migration
CN111600775B (en) * 2020-05-15 2022-02-22 苏州浪潮智能科技有限公司 Security testing method, device, equipment and medium for cluster encryption migration
CN112328358A (en) * 2020-10-28 2021-02-05 惠州华阳通用电子有限公司 Dual-system starting method based on virtual machine and storage medium
CN112860380A (en) * 2021-03-04 2021-05-28 中国科学院信息工程研究所 Virtual machine trusted migration method based on built-in security chip
CN112882799A (en) * 2021-03-04 2021-06-01 中国科学院信息工程研究所 Virtual machine trusted migration system based on built-in security chip
CN112883369A (en) * 2021-03-25 2021-06-01 中国科学院信息工程研究所 Credible virtualization system
CN112883369B (en) * 2021-03-25 2024-08-20 中国科学院信息工程研究所 Trusted virtualization system
CN115189928A (en) * 2022-06-25 2022-10-14 中国人民解放军战略支援部队信息工程大学 Dynamic safe migration method and system for password service virtual machine
CN115189928B (en) * 2022-06-25 2023-10-17 中国人民解放军战略支援部队信息工程大学 Dynamic security migration method and system for password service virtual machine
CN114938275A (en) * 2022-07-21 2022-08-23 国开启科量子技术(北京)有限公司 Method, apparatus, medium, and device for migrating virtual machine using quantum key
CN114938275B (en) * 2022-07-21 2022-10-14 国开启科量子技术(北京)有限公司 Method, apparatus, medium, and device for migrating virtual machine using quantum key

Similar Documents

Publication Publication Date Title
CN109783192A (en) A kind of secure virtual machine migratory system
CN109684037A (en) A kind of secure virtual machine moving method
Bouchenak et al. Verifying cloud services: present and future
CN101937357B (en) Virtual machine migration decision-making method, device and system
Badger et al. Cloud computing synopsis and recommendations
CN105095768B (en) Virtualization-based trusted server trust chain construction method
CN111158906B (en) Active immunity credible cloud system
CN103139221B (en) Data migration method between a kind of dependable virtual platform and construction method, platform
CN104715183B (en) A kind of trust authentication method and apparatus during virtual machine operation
Khan et al. Design and deployment of a trusted eucalyptus cloud
CN101739282B (en) Method, device and system for managing virtual machine
WO2014022604A1 (en) Trusted execution environment virtual machine cloning
CN104320391A (en) Cloud authentication method and system
WO2016058318A1 (en) Elastic virtual machine (vm) resource scaling method, apparatus and system
CN108733453A (en) The operating method and system of credible cloud platform virtual credible root example
NL2031835B1 (en) License management for software defined silicon
CN107704308B (en) Virtual platform vTPM management system, trust chain construction method and device, and storage medium
CN116305136A (en) Source audit trail for micro-service architecture
CN108255579A (en) A kind of virtual machine management method and device based on KVM platforms
Munodawafa et al. Security risk assessment within hybrid data centers: A case study of delay sensitive applications
CN111143030B (en) Migration method of cloud environment trusted virtual machine
CN113297133B (en) Service migration quality guarantee method and system
CN106445641A (en) Method for data migration between safety virtual platforms on discrete computing node
Debes et al. Blindtrust: Oblivious remote attestation for secure service function chains
de Aguiar Monteiro et al. A Survey on Microservice Security–Trends in Architecture Privacy and Standardization on Cloud Computing Environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190521

RJ01 Rejection of invention patent application after publication