Abstract

This paper proposes a trusted enhancement model for bare-metal VMs, which can provide credible guidance and application credible enhancement in combination with the startup and booting characteristics of bare-metal VMs. The model is suitable for terminals with multi-security service requirements. It can be divided into several trusted virtual isolation terminals according to the actual needs of users. It has the characteristics of not changing the existing network topology, high security and rapid deployment.

Highlights

  • With the intensification of national informatization construction, the construction of various information systems is increasing day by day, and the access equipment and applications have become increasingly complex

  • Starting with the bare-metal virtual machine, this paper proposes a credible and enhanced technology based on the bare-metal virtual machine through the study of the startup and operation mechanism of the bare-metal virtual machine, and establishes a credible and safe operating environment for the bare-metal virtual machine system, Which can provide users with technical support for the safe deployment and use of multi-level security business systems, and is of great significance to the development of virtualization technology and the construction of important information systems

  • Step 1: Power-on and power-on The BIOS loads the virtual machine monitor (VMM), user VMs, and I / O VMs respectively; Step 2: VM Manager loads OSLOADER; Step 3: According to the preset number of virtual machines, OSLOADER loads OS KERNEL for each user virtual machine respectively; Step 4: Load the local application of the user VM according to the user selection or the latest usage, at this time, the user can use the terminal normally; Step 5: If the user needs to switch to another virtual machine, the software box is loaded by the current virtual machine

Read more

Summary

Introduction

With the intensification of national informatization construction, the construction of various information systems is increasing day by day, and the access equipment and applications have become increasingly complex. Due to the different service types and security levels of the information system, users often need to operate multiple terminals at the same time, which makes it more and more difficult for a user to manage daily usage and operation and maintenance. Virtual machine technology can work in different virtual environments by separating different types of applications such as office, business processing, and information access to meet users' needs of safely handling different dense-level services in the same physical terminal environment. Starting with the bare-metal virtual machine, this paper proposes a credible and enhanced technology based on the bare-metal virtual machine through the study of the startup and operation mechanism of the bare-metal virtual machine, and establishes a credible and safe operating environment for the bare-metal virtual machine system , Which can provide users with technical support for the safe deployment and use of multi-level security business systems, and is of great significance to the development of virtualization technology and the construction of important information systems

A Virtual machine classification and characteristics
Bare-metal virtual machine startup process
Trusted model based on bare-metal virtual machine
Virtual machine trust transfer model
Based on the bare metal model of trusted enhanced architecture
Prototype system design
Security analysis
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.