Affiliation:
1. IBM T. J. Watson Research Center, Hawthorne, NY
2. IBM T. J. Watson Research Center, Yorktown Heights, NY
3. IBM Systems & Technology Group, Research Triangle Park, NC
Abstract
Virtualization technology is becoming increasingly common in datacenters, since it allows for collocation of multiple workloads, consisting of operating systems, middleware and applications, in different virtual machines (VMs) on shared physical hardware platforms. However, when coupled with the ease of VM migration, this trend increases the potential surface for security attacks. Further, the simplified management of VMs, including creation, cloning and migration, makes it imperative to monitor and guarantee the integrity of software components running within VMs.
This paper presents the IBM Trusted Virtual Datacenter (TVDc) technology developed to address the need for strong isolation and integrity guarantees, thus significantly enhancing security and systems management capabilities, in virtualized environments. It signifies the first effort to incorporate trusted computing technologies directly into virtualization and systems management software. We present and discuss various components that constitute TVDc: the Trusted Platform Module (TPM), the virtual TPM, the IBM hypervisor security architecture (sHype) and the associated systems management software.
Publisher
Association for Computing Machinery (ACM)
Cited by
60 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Centralized Accessibility of VM for Distributed Trusted Cloud Computing;2023 4th International Conference on Computing, Mathematics and Engineering Technologies (iCoMET);2023-03-17
2. An Efficient Model to Predict Network Packets in TVDC Using Machine Learning;Journal of Advances in Information Technology;2023
3. Security Framework for Hosting Systems on the Cloud: Case Study of Jordan E-Government Websites;2022 International Conference on Emerging Trends in Computing and Engineering Applications (ETCEA);2022-11
4. Securing Cloud Virtual Machine Image Using Ethereum Blockchain;International Journal of Information Security and Privacy;2022-04-01
5. A Deep Learning-Based Trust Assessment Method for Cloud Users;Security and Communication Networks;2021-07-02