Towards Multi–Layer Trusted Virtual Domains
نویسندگان
چکیده
We address the fine-grained control of information flow between distributed applications to protect transactions. Confining transactions in distributed untrusted environments is crucial for Web services, distributed computing, and most e-commerce applications relying on those technologies. Applications must be protected from rogue peer applications but at the same time applications need to communicate to selected peer applications to implement transactions and distributed services. We propose a solution based on Trusted Virtual Domains (TVD), which represent a new model for achieving IT and business security. TVDs are designed to satisfy business-level goals by simplifying management and providing explicit infrastructure-level containment and trust guarantees. TVDs can be applied to different layers within a system. We consider here TVDs for the virtual machine monitor (VMM) as well as at the application level. Combining protection in those layers is especially useful for systems that intersect multiple virtual machines and need to separate information flow at the applications level. In this contribution, we briefly describe the design and the prototype implementations of TVDs at the application and VMM levels. We focus on implications of the layering of these two TVDs to achieve consistent trust and confinement properties across distributed applica-
منابع مشابه
Trusted Virtual Domains - Design, Implementation and Lessons Learned
A Trusted Virtual Domain (TVD) is a coalition of virtual machines and resources (e.g., network, storage) that are distributed over multiple physical platforms and share a common security policy. The concept of TVDs and their usage scenarios have been studied extensively. However, details on certain implementation aspects have not been explored in depth yet, such as secure policy deployment and ...
متن کاملA Trusted Computing Base for Embedded Systems
The structure of many secure systems has been based on the idea of a security kernel—an operating system nucleus that performs all trusted functions. The difficulty with this approach is that the security kernel tends to be rather large, complex, and unstructured. This paper proposes an alternative structure for secure embedded systems. The structure comprises three layers. At the bottom is a D...
متن کاملBehavior-based Attestation of Policy Enforcement among Trusted Virtual Domains
With serious situation of data leakage in many enterprises, sensitive dataflow protection based on Trusted Virtual Domains (TVD) has been gradually paid much attention to. Remote attestation among two or more entities across trusted virtual domains is an important means to ensure sensitive dataflow. According to behavior compliance, this paper proposes a behavior-based attestation of policy enf...
متن کاملHypeBIOS: Enforcing VM Isolation with Minimized and Decomposed Cloud TCB
Virtualization has made cloud computing a popular trend by virtue of its elastic “data anywhere” and “computing anywhere”. However, traditional virtualization architectures usually have three drawbacks: 1) being vulnerable to many known attacks targeting at the large software stacks; 2) endowing too much power to cloud providers, who can fully control the Virtual Machine Monitor (VMM) and the m...
متن کاملAn Open Trusted Computing Architecture — Secure Virtual Machines Enabling User-Defined Policy Enforcement
Virtualization of computers enables a wide variety of applications ranging from server consolidation to secure sandboxing of malicious content. Today, lack of security of virtual machines is a major obstacle for broad adoption of virtual machine technology. We address this obstacle by an open architecture that adds scalable trusted computing concepts to a virtual machine infrastructure. The pla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006