跳到主要內容

簡易檢索 / 詳目顯示

研究生: 彭博涵
Po-Han Peng
論文名稱: 基於屬性驗證之VM-vTPM同等級安全遷移
VM-vTPM same level secure migration based on property verification
指導教授: 曾黎明
Li-Ming Tseng
口試委員:
學位類別: 碩士
Master
系所名稱: 資訊電機學院 - 軟體工程研究所
Graduate Institute of Software Engineering
論文出版年: 2014
畢業學年度: 102
語文別: 中文
論文頁數: 67
中文關鍵詞: 屬性驗證虛擬機遷移TPMvTPM
外文關鍵詞: VM migration, property verify, TPM, vTPM
相關次數: 點閱:31下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 為了滿足電腦使用者對於資料安全的需求,世界各國的公司組成了一個可信任運算組織(Trusted Computing Group)專門制定各種安全標準,其中對於可信任的平台制定了可信任平台模組(Trusted Platform Module),以此開發的晶片做為可信任基礎,確保平台的完整性以及可信性,進而能夠保護系統上其他元件與資料的完整性。
    隨著雲端運算的快速發展,各種不同的應用如雨後春筍般冒出,來自各方的新創公司與使用者更是源源不絕的投入雲端市場。雲端服務的提供商為了滿足眾多使用者的需求,必須不斷增加自己的硬體設備,並透過虛擬化的技術來調整所提供的資源。為了讓使用者在雲端環境中也能使用可信任平台模組的功能,所以近年發展了虛擬的可信任平台模組(virtual TPM),讓同一台實體機器上的虛擬機都能享有TPM帶來的好處。
    因為負載平衡、系統升級或資源調配等等軟體或硬體的原因,虛擬機需要在不同的主機之間遷移,以達到最好的運用。對於使用vTPM的虛擬機,在遷移時需要將虛擬機與vTPM一同做遷移。為了保持虛擬機在遷移的每個階段都是安全的,遷移時需要建立安全通訊管道,並確認遷移的目的端是否為可信任的,保護用戶資料的安全。
    目前的通訊協定在遷移時只能做到二元的判斷,對於遷移的環境沒有更詳細的檢查,由於被遷移的虛擬機可能會需要較良好的安全性,把虛擬機遷移至舊版存有漏洞的系統環境下,則會對該虛擬機的安全性造成危害。若是在遷移時能對於遷移的環境有精細的確認,比如使用的系統、版本或地點,則可以對虛擬機的安全有較安全的保障。
    本論文提出一安全VM-vTPM遷移機制,對於在雲端環境使用vTPM的使用者不需擔心VM的安全等級下降。在新主機加入時會對其各方面的屬性做確認,並給予相對應的基於屬性的加密金鑰。在遷移的過程中,會使用該金鑰對遷移的目的端進行驗證,確保目的端不僅是可信任的一方,所達到的安全等級也滿足遷移來源端的要求。


    Trusted Computing Group formed by international industries develops specifications for security problems, including specification of Trusted Platform Module (TPM). Platforms built on TPM could treat it as the base of trusted computing, and then protect data confident and integrity on the platform.
    Cloud computing developed rapidly in recent years. There are a lot of companies, developers and users join this market. Fulfilling the massive requirements from client, cloud service providers would expand the hardware resources and use virtualization technology to reach maximum usage of these resources. The virtualization technology for TPM, called virtual TPM, provides trusted computing for every virtual machine on the same platform.
    VMs would be migrated between different hosts for load balancing, system upgrade and other reasons. The virtual machines which have vTPM need to be migrated together. In order to keep the security of the VM and vTPM, there is need to build a secure channel and check the destination authority before migration.
    Current migration protocols only check the destination of migration can be trusted or not. The platform of destination runs an old and vulnerable system decreases the secure requirements of the VM migrated to the platform. It should check the property of platform before migration.
    In this paper, we propose a secure VM-vTPM migration protocol for keep VM secure level after migration. Before a new hosts join to the cloud service, its property would be checked and given a property-based key. In the migration stage, platform of the source would use the key to verify the platform of destination is fulfilled of the secure level.

    摘要 I Abstract II 目錄 III 圖目錄 VI 表目錄 VII 符號說明 VIII 一、緒論 1 1-1研究背景 1 1-2研究動機與目的 2 1-3論文架構 3 二、背景知識 5 2-1 虛擬化 5 2-2可信任計算(TPM) 6 2-2-1可信任基礎 6 2-2-2 TPM的元件 7 2-2-3 TCG軟體庫 9 2-2-4 TPM應用程式 10 2-3 vTPM 12 2-3-1 Software virtualization of TPMs: by Berger S, et al. 13 2-3-2 Hardware virtualization of TPMs: by Stumpf F, et al. 15 2-3-3 Para-virtualized TPM sharing: by England P, et al. 16 2-3-4 Property-based TPM virtualization: by Sadeghi A, et al. 18 三、相關研究 20 3-1安全VM-vTPM遷移動機 20 3-2.Xen的VM遷移通訊協定 20 3-3.現有vTPM遷移通訊協定 21 3-3-1 Protocol1: by Berger S, et al. 21 3-3-2 Protocol 2:by Stumpf F, et al. 22 3-3-4 Protocol 3: by Sadeghi A, et al. 23 3-3-3 Protocol 3: Xen 3.1.0 vTPM 通訊協定 24 3-4 Ciphertext-Policy Attribute-Based Encryption (CPABE) 25 3-5通訊協定需求 27 四、系統設計與架構 28 4-1攻擊者假設 28 4-2 vTPM金鑰架構設定 28 4-2-1 vTPM 金鑰 29 4-2-2 隨vTPM遷移的金鑰 31 4-2-3 vTPM金鑰遷移 32 4-3 通訊協定設計 33 4-3-1加入新節點 33 4-3-2 VM-vTPM遷移 34 五、實驗與討論 38 5-1 ‬實驗環境與設定 38 5-1-1 實驗環境 38 5-1-2 實驗設定 39 5-2 實驗操作 42 5-2-1 加入新主機 42 5-2-2 安全通訊協定與適當屬性 46 5-2-3 安全通訊協定與不適當屬性 49 5-2-4 討論 50 六、結論 52 參考文獻 53

    [1] Trusted Computing Group http://www.trustedcomputinggroup.org/
    [2] TPM Main Specification Level 2 Version 1.2, Revision 116
    [3] G. J. Popek and R. P. Goldberg. “Formal requirements for virtualizable third generation architectures”. ACM Symposium on Operating System Principles, pp. 121, 1973.
    [4] S. Berger, R. Cáceres, K. A. Goldman, R. Perez, R. Sailer, and L. van Doorn. “vtpm: Virtualizing the trusted platform module”. USENIX Security Symposium, pp. 305-320, 2006.
    [5] F. Stumpf and C. Eckert. “Enhancing trusted platform modules with hardware-based virtualization techniques”. International Conference on Emerging Security Information, Systems and Technologies, pp. 1–9, 2008.
    [6] P. England and J. Loeser. “Para-virtualized TPM sharing”. International conference on Trusted Computing and Trust in Information Technologies, pp. 119-132, 2008.
    [7] A. Sadeghi, C. Stüble, and M. Winandy. “Property-based TPM virtualization”, International conference on Information Security, pp. 1-16, 2008.
    [8] V. Goyal, O. Pandey, A. Sahai, and B. Waters. “Attribute Based Encryption for Fine-Grained Access Control of Encrypted Data”. ACM conference on Computer and Communications Security, 2006.
    [9] Amazon Elastic Compute Cloud http://aws.amazon.com/ec2/
    [10] Microsoft Windows Azure http://azure.microsoft.com/zh-tw/
    [11] M. Pearce, S. Zeadally, and R. Hunt. “Virtualization: Issues, security threats, and solutions”. ACM Computing Surveys, Vol. 45, no. 2, pp. 17:1-17:39, March 2013.
    [12] C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt and A. Warfield. “Live Migration of Virtual Machines”. Symposium on Networked Systems Design & Implementation, Vol. 2,pp. 273-286, 2005
    [13] B. Danev, R. Masti, G. Karame and S. Capkun. “Enabling secure VM-vTPM migration in private clouds”. Annual Computer Security Applications Conference, pp. 187-196, 2011
    [14] J. Oberheide, E. Cooke and F. Jahanian. “Exploiting live virtual machine migration”. Black Hat DC, Washington DC, February 2008.
    [15] R. Anand , R. Regan and S. Sarswathi. ” Security issues in virtualization environment”. International Conference on Radar, Communication and Computing, pp. 254-256, 2012.
    [16] P. Sharma, S. K. Sood and S. Kaur. “Security Issues in Cloud Computing”, Communications in Computer and Information Science, Vol. 169, pp. 36-45, 2011.
    [17] TCG software stack http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_specification
    [18] Xen Source Repositories http://xenbits.xensource.com/
    [19] H. Stamer and M. Strasser.“A Software-Based Trusted Platform Module Emulator”. Trusted Computing - Challenges and Applications, Vol. 4968, pp. 33-47, Austria, 2008.
    [20] S. Gujrathi. “Heartbleed Bug: An OpenSSL Heartbeat Vulnerability”. International Journal of Computational Science and Engineering, Vol2, pp. 61-64, 2014.
    [21] F. Sabahi. “Cloud computing security threats and responses”. International Conference on Communication Software and Networks, pp. 245-249, 2011.
    [22] H. C. Lim, S. Babu, J. S. Chase and S. S. Parekh. “Automated control in cloud computing: challenges and opportunities”. Automated control for datacenters and clouds, pp. 13-18, 2009.
    [23] R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka and J. Molina. “Controlling data in the cloud: outsourcing computation without outsourcing control”. ACM workshop on Cloud computing security, pp. 85-90, 2009.
    [24] A. Almutairi, M. Sarfraz, S. Basalamah, W.G. Aref and A. Ghafoor. “A Distributed Access Control Architecture for Cloud Computing”. Software, IEEE, Vol. 29, pp. 36-44, 2012.
    [25] P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt and A. Warfield. “Xen and the art of virtualization”. ACM Symposium on Operating Systems Principles, Vol. 37, pp. 164-177, 2003.
    [26] J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum and E. W. Felten. “Lest we remember: cold-boot attacks on encryption keys”. Communications of the ACM - Security in the Browser, Vol. 52, pp. 91-98, 2009.
    [27] TCG Software Stack (TSS) Specification, Version 1.2. http://www.trustedcomputinggroup.org/resources/tcg_software_stack_tss_specification
    [28] TCG Architecture Overview, Version 1.4. http://www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14
    [29] R. Sailer, X. Zhang, T. Jaejer and L. Van Doorn. “Design and Implementation of a TCG-based Integrity Measurement Architecture”. USENIX Security Symposium, Vol13, pp. 16, 2004.
    [30] Setting up TPM protected certificates using a Microsoft Certificate Authority. http://blogs.technet.com/b/pki/archive/2014/06/05/setting-up-tpm-protected-certificates-using-a-microsoft-certificate-authority-part-1-microsoft-platform-crypto-provider.aspx
    [31] A Guide to Hardware-Based Endpoint Security. http://www.trustedcomputinggroup.org/resources/how_to_use_the_tpm_a_guide_to_hardwarebased_endpoint_security
    [32] Direct Anonymous Attestation. http://www.zurich.ibm.com/security/daa/

    QR CODE
    :::