2019
DOI: 10.26599/tst.2018.9010129
|View full text |Cite
|
Sign up to set email alerts
|

Cloud virtual machine lifecycle security framework based on trusted computing

Abstract: As a foundation component of cloud computing platforms, Virtual Machines (VMs) are confronted with numerous security threats. However, existing solutions tend to focus on solving threats in a specific state of the VM. In this paper, we propose a novel VM lifecycle security protection framework based on trusted computing to solve the security threats to VMs throughout their entire lifecycle. Specifically, a concept of the VM lifecycle is presented divided up by the different active conditions of the VM. Then, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…In 2019, Jin et al [12] put out a unique trusted computing based VM lifecycle safeguard protection system to address the security risks to VMs at every stage of their existence. The multiple active situations of the VM are used to break up a technique associated with the VM lifetime.…”
Section: Related Workmentioning
confidence: 99%
“…In 2019, Jin et al [12] put out a unique trusted computing based VM lifecycle safeguard protection system to address the security risks to VMs at every stage of their existence. The multiple active situations of the VM are used to break up a technique associated with the VM lifetime.…”
Section: Related Workmentioning
confidence: 99%
“…The remote attestation technique, first proposed by TCG, has become the primary method for assessing the trustworthy state of a target system. In most of the existing disclosed schemes [19,28], the baseline value data is stored in the cloud management center. Moreover, it is assumed that the cloud hypervisor is absolutely trustworthy.…”
Section: The Remote Attestationmentioning
confidence: 99%
“…However, ascertaining threat progression in the Cloud requires modeling the functionality of the Cloud that captures interactions among services. Thus, we define an abstract model for the Cloud emphasizing the interactions of services during the life cycle of a VM [7]. The Cloud model shown in Figure 2 Block I: Functional Cloud Model…”
Section: Functional Cloud Modelmentioning
confidence: 99%