• DocumentCode
    3516650
  • Title

    Protecting the Confidentiality of Virtual Machines Against Untrusted Host

  • Author

    Kong, Jinzhu

  • Author_Institution
    Comput. Sch., Nat. Univ. of Defense Technol., Changsha, China
  • fYear
    2010
  • fDate
    28-29 Oct. 2010
  • Firstpage
    364
  • Lastpage
    368
  • Abstract
    Virtualization has been widely used in cloud computing systems to cut costs, and to provide dynamically scalable resources over the internet. Many ideas have been proposed to increase the security of the virtualized systems. But, a big unspoken assumption of these ideas is that the cloud users have to trust the cloud provider totally and unconditionally. In reality, however, this assumption can´t always hold water, host administrator, for one reason or another, is prone to illegally access the sensitive data stored in the guest virtual machines. In this paper, we put forward ideas to protect the confidentiality of virtual machines when the host administrator is untrusted. Based on virtualization environment, we define our threat model and analyze a set of security aspects which are of real-world concerns. Leveraging trusted computing technologies, we propose possible solutions to these security threats. The solutions can provide better confidentiality to cloud users, and have practical value to the future cloud construction.
  • Keywords
    cloud computing; security of data; virtual machines; Internet; cloud computing system; trusted computing technology; untrusted host; virtual machine; virtualized system security; Cloud computing; Clouds; Computer architecture; Hardware; Security; Virtual machine monitors; Virtual machining; confidentiality; trusted computing; virtual machine;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Intelligence Information Processing and Trusted Computing (IPTC), 2010 International Symposium on
  • Conference_Location
    Huanggang
  • Print_ISBN
    978-1-4244-8148-4
  • Electronic_ISBN
    978-0-7695-4196-9
  • Type

    conf

  • DOI
    10.1109/IPTC.2010.11
  • Filename
    5663256