北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2014, Vol. 37 ›› Issue (5): 85-90.doi: 10.13190/j.jbupt.2014.05.018

• 研究报告 • 上一篇    下一篇

IaaS云虚拟机eID可信验证系统

吴旭1,2, 许晋1,2, 李春文3, 刘川意1,2   

  1. 1. 北京邮电大学 计算机学院, 北京 100876;
    2. 北京邮电大学 可信分布式计算与服务教育部重点实验室, 北京 100876;
    3. 中国农业银行总行 软件开发中心, 北京 100073
  • 收稿日期:2013-10-17 出版日期:2014-10-28 发布日期:2014-11-07
  • 作者简介:吴 旭(1963- ), 女, 研究员, 博士生导师;许 晋(1990- ), 男, 硕士生, E-mail: xujin59545@bupt.edu.cn.
  • 基金资助:

    国家高技术研究发展计划项目(2012AA01A404)

Research on eID-Based Virtual Machine Trusted Attestation System in IaaS Cloud

WU Xu1,2, XU Jin1,2, LI Chun-wen3, LIU Chuan-yi1,2   

  1. 1. School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China;
    2. Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing 100876, China;
    3. Software Development Center, Head Office of the Agricultural Bank of China, Beijing 100073, China
  • Received:2013-10-17 Online:2014-10-28 Published:2014-11-07

摘要:

为了解决云计算模式下数据与计算迁移造成的用户与云之间的互可信问题,从硬件平台、用户身份和用户行为多个维度,研究并设计了IaaS云虚拟机(eID)可信验证系统. 硬件平台采用可信第三方架构,采用全国唯一的公民网络电子身份eID标识用户身份,建立诚信记录,评估用户行为. 通过用户身份可信性验证、虚拟机可信性验证等4个阶段,有效解决了用户与云之间的互可信问题. 实验结果表明,该系统可抵御常见攻击方式,安全性高,且其计算时间复杂度在可接受范围内.

关键词: 可信计算, 云计算, 基础设施云, 网络电子身份证, 远程验证

Abstract:

In cloud computing, the data and computation migration gives rise to trust problems between the user and the cloud. Including the hardware platform, the multiple dimensions method was studied, as well as the user identity and behavior. The electronic identity (eID)-based virtual machine trusted attestation system in infrastructure-as-a-service (IaaS) cloud was designed. The hardware platform was used for trust third party architecture. The citizen's network eID was used as users unique authoritative identity. The credit records were also applied to evaluate the user's behaviors. Four steps were adopted to solve the trust problem between two sides, including trusted attestation of the user identification and trusted attestation of the virtual machine. Experiment analysis shows that this system can defend common attacks, it is more safety, and the time complexity is within acceptable limitations.

Key words: trust computing, cloud computing, infrastructure as a service, electronic identity, remote attestation

中图分类号: