Volume 27, Issue 5 pp. 1092-1109
Research Article

OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines

Bin Xing

Corresponding Author

Bin Xing

School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China

Correspondence to: Bin Xing, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China.

E-mail: [email protected]

Search for more papers by this author
Zhen Han

Zhen Han

School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China

Search for more papers by this author
Xiaolin Chang

Xiaolin Chang

School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China

Search for more papers by this author
Jiqiang Liu

Jiqiang Liu

School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China

Search for more papers by this author
First published: 11 April 2014
Citations: 11

Summary

Infrastructure as a Service cloud provides elasticity and scalable virtual machines (VMs) as computing service to multiple tenants, but the tenants lose the full control of their data. Measuring the integrity of critical files of the VMs and providing the integrity attestation to the tenants on the basis of TCG trusted computing techniques is an effective way to alleviate their anxiety. This paper considers how to measure the integrity of the processes run in guest VMs and files opened in guest VMs. We propose an out-of-the-box integrity measurement approach to measure the integrity of critical files through system call (syscall) interception without any modification of the guest VMs. Out-of-the-box integrity measurement approach can not only measure the integrity of all files that have been considered by existing approaches but also measure the integrity of the system configuration files, program loaders, and script interpreters, which affect the system behaviors and integrity. The ability of supporting both system and manual measurement policies makes our approach flexible. We implement this approach in Xen hypervisor with little modification of the existing syscall interception method, and this approach can be ported to other virtualization platform easily. Copyright © 2014 John Wiley & Sons, Ltd.

The full text of this article hosted at iucr.org is unavailable due to technical difficulties.