Virtualization-based separation of privilege: working with sensitive data in untrusted environment

  • Authors:
  • Igor Burdonov;Alexander Kosachev;Pavel Iakovenko

  • Affiliations:
  • Institute for System, Moscow, Russia;Institute for System, Moscow, Russia;Institute for System, Moscow, Russia

  • Venue:
  • Proceedings of the 1st EuroSys Workshop on Virtualization Technology for Dependable Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Contemporary commodity operating systems are too big and do not inspire trust in their security and reliability. Still they are used for processing sensitive data due to the vast amount of legacy software and good support for virtually all hardware devices. Common approaches used to ensure sensitive data protection are either too strict or not reliable. In this article we propose virtualization-based approach for preventing sensitive data leaks from a computer running untrusted commodity OS without sacrificing public network connectivity, computer usability and performance. It is based on separating privileges between two virtual machines: public VM that has unlimited network access and private (isolated) VM that is used for processing sensitive data. Virtual machine monitor uses public VM to provide transparent access to Internet for selected trusted applications running inside the private VM on a system call level. Proposed security architecture allows using one and the same untrusted OS on both virtual machines without necessity to encrypt sensitive data. However it poses a challenge of enforcing dynamic protection over the trusted applications running in the potentially compromised OS. We investigate this problem and provide our solution for it.