Morikawa Hiroaki, H. Ebara, Onishi Katsumi, Nakano Hideo
{"title":"Xen上vTPM访问控制的改进","authors":"Morikawa Hiroaki, H. Ebara, Onishi Katsumi, Nakano Hideo","doi":"10.1109/ICPPW.2010.44","DOIUrl":null,"url":null,"abstract":"Nowadays, computing resources have taken tens percent of utilization at busy time for increasing computing power. However, the virtual machine (VM) technology is effective to the use of computing resources. Besides, the vulnerable services in VM prevent the affect of the other VM attacks. For example, Amazon has applied the VM method to run in real machine (Host OS) independently but attackers can retrieve data by CPU and memory dump software. Therefore this study suggests a method to improve the access virtual Trusted Platform Module (vTPM) implemented in Xen software to keep the server system safely. Furthermore, we implement and evaluate this method.","PeriodicalId":415472,"journal":{"name":"2010 39th International Conference on Parallel Processing Workshops","volume":"15 10","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Improvement for vTPM Access Control on Xen\",\"authors\":\"Morikawa Hiroaki, H. Ebara, Onishi Katsumi, Nakano Hideo\",\"doi\":\"10.1109/ICPPW.2010.44\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, computing resources have taken tens percent of utilization at busy time for increasing computing power. However, the virtual machine (VM) technology is effective to the use of computing resources. Besides, the vulnerable services in VM prevent the affect of the other VM attacks. For example, Amazon has applied the VM method to run in real machine (Host OS) independently but attackers can retrieve data by CPU and memory dump software. Therefore this study suggests a method to improve the access virtual Trusted Platform Module (vTPM) implemented in Xen software to keep the server system safely. Furthermore, we implement and evaluate this method.\",\"PeriodicalId\":415472,\"journal\":{\"name\":\"2010 39th International Conference on Parallel Processing Workshops\",\"volume\":\"15 10\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-09-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 39th International Conference on Parallel Processing Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICPPW.2010.44\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 39th International Conference on Parallel Processing Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICPPW.2010.44","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Nowadays, computing resources have taken tens percent of utilization at busy time for increasing computing power. However, the virtual machine (VM) technology is effective to the use of computing resources. Besides, the vulnerable services in VM prevent the affect of the other VM attacks. For example, Amazon has applied the VM method to run in real machine (Host OS) independently but attackers can retrieve data by CPU and memory dump software. Therefore this study suggests a method to improve the access virtual Trusted Platform Module (vTPM) implemented in Xen software to keep the server system safely. Furthermore, we implement and evaluate this method.