计算机应用 ›› 2017, Vol. 37 ›› Issue (2): 378-382.DOI: 10.11772/j.issn.1001-9081.2017.02.0378

• 第十届中国可信计算与信息安全学术会议 • 上一篇    下一篇

基于无证书环签名的虚拟机可信证明方案

荣星1,2, 赵勇2   

  1. 1. 信息工程大学, 郑州 450004;
    2. 北京工业大学 信息学部, 北京 100124
  • 收稿日期:2016-09-06 修回日期:2016-09-30 出版日期:2017-02-10 发布日期:2017-02-11
  • 通讯作者: 荣星,royafly@126.com
  • 作者简介:荣星(1986-),男,安徽合肥人,博士研究生,主要研究方向:信息安全、云计算;赵勇(1980-),男,山西左权人,讲师,博士,主要研究方向:可信计算、网络安全。
  • 基金资助:
    国家863计划项目(2015AA016002)。

Trustworthiness attestation scheme for virtual machine based on certificateless ring signature

RONG Xing1,2, ZHAO Yong2   

  1. 1. Information Engineering University, Zhengzhou Henan 450004, China;
    2. College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • Received:2016-09-06 Revised:2016-09-30 Online:2017-02-10 Published:2017-02-11
  • Supported by:
    This work is partially supported by the National High Technology Research and Development Program (863 Program) of China (2015AA016002).

摘要: 由于虚拟环境的复杂性和动态性,使用传统方法证明其安全状态时会出现运算效率低下的情况;而环签名具有运算效率高、匿名性强的特点,利用无证书公钥系统可解决密钥管理问题。为此,提出一种采用无证书环签名机制的虚拟机可信证明方案。私钥生成中心(PKG)验证平台物理环境的状态可信后,由PKG和虚拟可信平台模块(vTPM)管理器利用无证书算法共同生成vTPM签名密钥,虚拟机对外证明时采用环签名机制,将证明者的信息隐藏在环成员列表中,从而实现虚拟机对外的匿名身份证明和状态证明。在完成证明准备工作后,虚拟机不需要在每次证明和迁移时重复生成虚拟身份证明密钥(vAIK)证书,因此大大提高了证明效率;另外方案具有很强的安全性和匿名性,适用于虚拟机数量巨大的云计算环境。

关键词: 虚拟机, 可信证明, 无证书公钥系统, 环签名, 云计算

Abstract: Due to the complexity and dynamic behavior in virtual environment, the efficiency is low when adopting traditional methods to prove the secure state of virtual machines. Ring signature has high computational efficiency and strong anonymity, so the the key management can be solved by using the certificateless public key system. A trustworthiness attestation scheme which adopted certificateless ring signature scheme in Virtual Machine (VM) was put forward. After the trusted physical environment of virtual platform was validated by the Private Key Generator (PKG), the virtual Trusted Platform Module (vTPM) signature key was generated by PKG and vTPM manager using certificateless signature algorithm, and the ring signature was employed by VM to perform remote attestation and hide attestor's identity in ring members, which realized the attestation of VM's anonymous identity and state. After completion of the proof preparation, the VM does not need to generate virtual Attestation Identity Key (vAIK) certificates repeatedly in the process of attestation and migration, thus greatly improving the efficiency of attestation. Consequently, the proposed scheme has strong security and anonymity, and it is suitable for the cloud computing environment with huge numbers of VMs.

Key words: Virtual Machine (VM), trustworthiness attestation, certificateless public key system, ring signature, cloud computing

中图分类号: