Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2011, Vol. 28 ›› Issue (5): 648-658.DOI: 10.7523/j.issn.2095-6134.2011.5.013

• Research Articles • Previous Articles     Next Articles

TPM security model for virtual domains

QIN Yu, LAN Hai-Bo   

  1. State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
  • Received:2010-09-01 Revised:2010-10-17 Online:2011-09-15

Abstract:

Considering that TPM access control mechanism can not be directly applied in virtualization computing, we build the security model for virtual domains based on the dependent relationships of TPM objects and the security requirements of the virtual domains. We add the security constraints of virtual domain, integrity and confidentiality, for the TPM objects' access requests in the model and solve the problems about TPM objects creation, usage, and destroy in multiple virtual domains. The logic analysis for the security rules in the model are further given in this paper. Through the tests on the prototype system, we show that the model has very small performance impact on trust virtualization platform.

Key words: TCG, TPM security model, virtualization, virtual domain, security level

CLC Number: