The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2010 vol.8)
pp: 56-62
Qian Liu , Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
Chuliang Weng , Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
Minglu Li , Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
Yuan Luo , Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
ABSTRACT
Cloud computing relies heavily on virtualization. Virtualization technology has developed rapidly because of the rapid decrease in hardware cost and concurrent increase in hardware computing power. A virtual machine monitor (VMM, also called a hγpervisor) between the hardware and the OS enables multiple virtual machines (VMs) to run on top of a single physical machine. The VMM manages scheduling and dispatching the physical resources to the individual VMs as needed, and the VMs appear to users as separate computers. Widely used virtualization technologies include VMWare, Xen, Denali, and the Kernel-Based Virtual Machine (KVM). In this framework, a module measures executables running in virtual machines (VMs) and transfers the values to a trusted VM. Comparing those values to a reference table containing the trusted measurement values of running executables verifies the executable/s status.
INDEX TERMS
Cloud computing, Monitoring, Hardware, Prototypes, Virtual machine monitors,security and privacy, In-VM measuring, virtual machines, verification, Trusted Platform Module, TPM, Xen
CITATION
Qian Liu, Chuliang Weng, Minglu Li, Yuan Luo, "An In-VM Measuring Framework for Increasing Virtual Machine Security in Clouds", IEEE Security & Privacy, vol.8, no. 6, pp. 56-62, November/December 2010, doi:10.1109/MSP.2010.143
REFERENCES
1. J. Sugerman, G. Venkitachalam, and B. Lim, "Virtualizing I/O Devices on VMware Workstation's Hosted Virtual Machine Monitor," Proc. Usenix Ann. Tech. Conf., Usenix Assoc., 2001, pp. 1–14.
2. P. Barham et al., "Xen and the Art of Virtualization," Proc. 19th ACM Symp. Operating Systems Principles, ACM Press, 2003, p. 177.
3. A. Whitaker, M. Shaw, and S. Gribble, "Denali: Lightweight Virtual Machines for Distributed and Networked Applications," Proc. Usenix Ann. Tech. Conf., Usenix Assoc., 2002; http://denali.cs.washington.edu/pubs/distpubs/ papersdenali_usenix2002.pdf.
4. B. Payne et al., "Lares: An Architecture for Secure Active Monitoring Using Virtualization," Proc. IEEE Symp. Security and Privacy, IEEE Press, 2008, pp. 233–247.
5. R. Sailer et al., "Design and Implementation of a TCG-Based Integrity Measurement Architecture," Proc. 13th Usenix Security Symp., Usenix Assoc., 2004, p. 16.
6. M. Sharif et al., "Secure In-VM Monitoring Using Hardware Virtualization," Proc. 16th ACM Conf. Computer and Communications Security, ACM Press, 2009, pp. 477–487.
7. TPM Main Specification, Part 1: Design Principles, ver. 1.2, Trusted Computing Group, 2003.
8. J. Singh, W. Weber, and A. Gupta, "Splash: Stanford Parallel Applications for Shared-Memory," ACM SIGARCH Computer Architecture News, vol. 20, no. 1, 1992, pp. 5–44.
145 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool