Proceedings of the 27th Annual Computer Security Applications Conference 2011
DOI: 10.1145/2076732.2076759
|View full text |Cite
|
Sign up to set email alerts
|

Enabling secure VM-vTPM migration in private clouds

Abstract: The integration of Trusted Computing technologies into virtualized computing environments enables the hardware-based protection of private information and the detection of malicious software. Their use in virtual platforms, however, requires appropriate virtualization of their main component, the Trusted Platform Module (TPM) by means of virtual TPMs (vTPM). The challenge here is that the use of TPM virtualization should not impede classical platform processes such as virtual machine (VM) migration.In this wor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 90 publications
(38 citation statements)
references
References 17 publications
0
38
0
Order By: Relevance
“…The security analysis based on Xen hypervisor elucidates the feasibility of the migration of VM supported by virtual TPM in the private cloud (Danev et al, 2011).…”
Section: Security Issues Of Vm In Private Cloudmentioning
confidence: 99%
“…The security analysis based on Xen hypervisor elucidates the feasibility of the migration of VM supported by virtual TPM in the private cloud (Danev et al, 2011).…”
Section: Security Issues Of Vm In Private Cloudmentioning
confidence: 99%
“…We can conclude that LVMM security is a critical issue in IaaS and it faces serious security challenges that need to be addressed and considered as an open research topic. There is a trend to secure LVMM through vTPM [39]. Nevertheless, TPM-based measurements are ineffective for detecting a malicious cloud service provider as well as having limitations in verifying the hypervisor integrity in public clouds via remote attestation [40].…”
Section: Fig 2: Lvmm Process Steps [24]mentioning
confidence: 99%
“…Such resource multiplexing largely reduces the total cost of ownership, and significantly improves the resource utilization. As a contribution of virtualization technology, VM migraton [13][14][15][16][17][18] improves the resource rearrangement on the fly.…”
Section: One-hop and Two-hop Comparisonmentioning
confidence: 99%