JOURNAL ARTICLE

Embedded Virtualization Computing Platform Security Architecture Based on Trusted Computing

Abstract

With the application of virtualization and multi-core processor in embedded system, the computing capacity of embedded system has been improved comprehensively, but it is also faced with malicious attacks against virtualization technology. First, it was analyzed the security requirements of each layer of embedded virtualization computing platform. Aiming at the security requirements, it was proposed the security architecture of embedded virtualization computing platform based on trusted computing module. It was designed the hardware trusted root on the hardware layer, the virtualization trusted root on the virtual machine manager layer, trusted computing component and security function component on guest operation system layer. Based on the trusted roots, it was built the static extension of the trusted chain on the platform. This security architecture can improve the active security protection capability of embedded virtualization computing platform.

Keywords:
Virtualization Computer science Trusted Computing Full virtualization Operating system Trusted Network Connect Direct Anonymous Attestation Enterprise information security architecture Virtual machine Hardware virtualization Trusted computing base Application virtualization Embedded system Trusted Platform Module Cloud computing Computer security Cloud computing security

Metrics

3
Cited By
0.44
FWCI (Field Weighted Citation Impact)
8
Refs
0.70
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Security and Verification in Computing
Physical Sciences →  Computer Science →  Artificial Intelligence
Cloud Data Security Solutions
Physical Sciences →  Computer Science →  Information Systems
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

© 2026 ScienceGate Book Chapters — All rights reserved.