首页 | 本学科首页   官方微博 | 高级检索  
     

IaaS云虚拟机eID可信验证系统
引用本文:吴旭,许晋,李春文,刘川意.IaaS云虚拟机eID可信验证系统[J].北京邮电大学学报,2014,37(5):85-90.
作者姓名:吴旭  许晋  李春文  刘川意
作者单位:1. 北京邮电大学 计算机学院, 北京 100876;
2. 北京邮电大学 可信分布式计算与服务教育部重点实验室, 北京 100876;
3. 中国农业银行总行 软件开发中心, 北京 100073
基金项目:国家高技术研究发展计划项目(2012AA01A404)
摘    要:为了解决云计算模式下数据与计算迁移造成的用户与云之间的互可信问题,从硬件平台、用户身份和用户行为多个维度,研究并设计了IaaS云虚拟机(eID)可信验证系统. 硬件平台采用可信第三方架构,采用全国唯一的公民网络电子身份eID标识用户身份,建立诚信记录,评估用户行为. 通过用户身份可信性验证、虚拟机可信性验证等4个阶段,有效解决了用户与云之间的互可信问题. 实验结果表明,该系统可抵御常见攻击方式,安全性高,且其计算时间复杂度在可接受范围内.

关 键 词:可信计算  云计算  基础设施云  网络电子身份证  远程验证  
收稿时间:2013-10-17

Research on eID-Based Virtual Machine Trusted Attestation System in IaaS Cloud
WU Xu,XU Jin,LI Chun-wen,LIU Chuan-yi.Research on eID-Based Virtual Machine Trusted Attestation System in IaaS Cloud[J].Journal of Beijing University of Posts and Telecommunications,2014,37(5):85-90.
Authors:WU Xu  XU Jin  LI Chun-wen  LIU Chuan-yi
Affiliation:1. School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China;
2. Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing 100876, China;
3. Software Development Center, Head Office of the Agricultural Bank of China, Beijing 100073, China
Abstract:In cloud computing, the data and computation migration gives rise to trust problems between the user and the cloud. Including the hardware platform, the multiple dimensions method was studied, as well as the user identity and behavior. The electronic identity (eID)-based virtual machine trusted attestation system in infrastructure-as-a-service (IaaS) cloud was designed. The hardware platform was used for trust third party architecture. The citizen's network eID was used as users unique authoritative identity. The credit records were also applied to evaluate the user's behaviors. Four steps were adopted to solve the trust problem between two sides, including trusted attestation of the user identification and trusted attestation of the virtual machine. Experiment analysis shows that this system can defend common attacks, it is more safety, and the time complexity is within acceptable limitations.
Keywords:trust computing  cloud computing  infrastructure as a service  electronic identity  remote attestation  
本文献已被 CNKI 等数据库收录!
点击此处可从《北京邮电大学学报》浏览原始摘要信息
点击此处可从《北京邮电大学学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号