skip to main content
research-article

Providing secure services for a virtual infrastructure

Published:01 January 2009Publication History
Skip Abstract Section

Abstract

Virtualization brings exibility to the data center and enables separations allowing for better security properties. For these security properties to be fully utilized, virtual machines need to be able to connect to secure services such as networking and storage. This paper addresses the problems associated with managing the cryptographic keys upon which such services rely by ensuring that keys remain within the trusted computing base. Here we describe a general architecture for managing keys tied to the underlying virtualized systems, with a specific example given for secure storage.

References

  1. M. Anderson, M. Moffie, and C. Dalton. Towards trustworthy virtualisation environments: Xen library os security services. Technical Report HPL-2007-69, HP Labs, 2007.Google ScholarGoogle Scholar
  2. A. Baldwin and S. Shiu. Encryption and key management in a san. In SISW '02: Proceedings of the First International IEEE Security in Storage Workshop. IEEE Computer Society, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Baldwin and S. Shiu. Hardware encapsulation of security services. In ESORICS, volume 2808 of LNCS. Springer, 2003.Google ScholarGoogle Scholar
  4. A. Baldwin and S. Shiu. Enabling shared audit data. Int. J. Inf. Secur., 4(4):263--276, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the art of virtualization. In SOSP '03: Proceedings of the 19th ACM symposium on Operating systems principles. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Bellare and B. Yee. Forward integrity for audit logs. Technical report, UCSD tech report, 1997.Google ScholarGoogle Scholar
  7. S. Berger, K. G. Ramón Ćaceres, R. Perez, R. Sailer, and L. van Doorn. vtpm: Virtualizing the trusted platform module. Technical Report RC23879, IBM Research, 2006.Google ScholarGoogle Scholar
  8. S. Cabuk, C. I. Dalton, H. Ramasamy, and M. Schunter. Towards automated provisioning of secure virtualized networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 235--245. ACM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Cabuk, D. Plaquin, T. Hong, and D. Murray. Improving policy verification capabilities of trusted platforms. Technical Report HPL-2008-71, HP Labs, 2007.Google ScholarGoogle Scholar
  10. T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. SIGOPS Oper. Syst. Rev., 37(5):193--206, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Gebhardt and A. Tomlinson. Secure virtual disk images for grid computing. In APTC '08: Proceedings of the 3rd Asia-Pacofoc Trusted Infrastructure Technologies Conference, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Kallahalla, M. Uysal, R. Swaminathan, D. E. Lowell, M. Wray, T. Christian, N. Edwards, C. I. Dalton, and F. Gittler. Softudc: A software-based data center for utility computing. Computer, 37(11):38--46, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. K. Kostienko. Securing access of virtual resources to a shared storage facility based on tcg. Master's thesis, University of Birmingham, October 2007.Google ScholarGoogle Scholar
  14. D. Kuhlmann, R. Landfermann, H. Ramasamy, M. Schunter, G. Ramunni, and D. Vernizzi. An open trusted computing architecture - secure virtual machines enabling userdefined policy enforcement. Technical Report RZ 3655, IBM Research, 2006.Google ScholarGoogle Scholar
  15. R. Merkle. Protocols for public key cryptography. In IEEE Symposium on Security and Privacy, 1980.Google ScholarGoogle Scholar
  16. C. Mitchell. Trusted Computing (Professional Applications of Computing. IEE Press, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. G. Murray, G. Milos, and S. Hand. Improving xen security through disaggregation. In VEE '08: Proceedings of the fourth ACM SIGPLAN/SIGOPS international conference on Virtual execution environments, pages 151--160. ACM, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Q. Rajpoot. Key management for secure storage in a virtualised data center. Master's thesis, University of Birmingham, October 2007.Google ScholarGoogle Scholar
  19. RSA Labs. Pkcs#11 v2.11 cryptographic token interface standard, 2001.Google ScholarGoogle Scholar
  20. R.Sailer, T. Jaeger, E. Valdez, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn. Building a mac-based security architecture for the xen opensource hypervisor. Technical Report RC23629, IBM Research, 2005.Google ScholarGoogle Scholar
  21. F. Stumpf, P. R. O. Tafreschi and, and C. Eckert. A robust integrity reporting protocol for remote attestation. In Proceedings of the Second Workshop on Advances in Trusted Computing, 2006.Google ScholarGoogle Scholar
  22. Trusted Computing Group. TCG pc specific implementation specification, 2003.Google ScholarGoogle Scholar

Index Terms

  1. Providing secure services for a virtual infrastructure

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM SIGOPS Operating Systems Review
          ACM SIGOPS Operating Systems Review  Volume 43, Issue 1
          January 2009
          97 pages
          ISSN:0163-5980
          DOI:10.1145/1496909
          Issue’s Table of Contents

          Copyright © 2009 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 January 2009

          Check for updates

          Qualifiers

          • research-article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader