Acta Metallurgica Sinica(English letters) ›› 2015, Vol. 22 ›› Issue (4): 7-16.doi: 10.1016/S1005-8885(15)60662-8

• Security • Previous Articles     Next Articles

Trusted Domain Hierarchical Model Based on Noninterference Theory

Zhang Lei, Chen Xingshu, Liu Liang, Jin Xin   

  1. 1. College of Computer Science, Sichuan University, Chengdu 610065, China 2. College of Electronics and Information Engineering, Sichuan University, Chengdu 610065, China
  • Received:2014-11-13 Revised:2015-06-10 Online:2015-08-28 Published:2015-08-28
  • Supported by:
    the National Natural Science Foundation of China (61272447), the National Key Technology R&D Program of China (2012BAH18B05); the National New Generation Broadband Wireless Mobile Communication Network Major Project (03 Project) of China (12H1510).

Abstract: To ensure the integrity and security of cloud tenants’ workload, and to prevent unexpected interference among tenants, cloud platform must make sure that system behaviors are trusted. By analyzing threats that exist in the cloud platform, a novel trusted domain hierarchical model (TDHM) based on noninterference theory was proposed in this paper to solve these problems. First of all, the abstraction modeling of tenants’ computing environment and trusted domain (TD) were introduced for designing TDHM with formal methods. Secondly, corresponding constraints for trusted running were given to satisfy security requirements of tenants’ TD, and security properties of TDHM ware analyzed. After that, trusted behavior of TD was defined based on these properties, and the decision theorem of that was proved. It illustrated that the design and implementation of TD in cloud followed the model with characteristics of trusted behavior. Finally, the implementation of prototype system was introduced based on our previous work, and evaluation results showed that the performance loss was in the acceptable range.

Key words: trusted domain hierarchical model, noninterference theory , cloud, integrity, security, trusted domain