Dynamic Remote Attestation on Trusted Computing

2014 ◽  
Vol 696 ◽  
pp. 167-172
Author(s):  
Bao Hua Zhao ◽  
Hao Guo

Remote attestation is the key technology of trusted computing. The existing remote attestation techniques lack of the trust measure of platform running state. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of platform running state, and a remote attestation program based on the trust measure results. By RO security analysis, and a simulation, we verify the security and efficiency of the program. The trust measure of platform running state is mainly based on the trust rating of the programs running on the platform, and a total trust value of the platform by an algorithm. The remote attestation for the trust measure of platform running state is based on K-CCA problem. In this paper, we carry out simulation experiment with different proportions of non-credible nodes and the experiment results verify the trust evaluation efficiency of the scheme on the platform.

2014 ◽  
Vol 696 ◽  
pp. 259-265 ◽  
Author(s):  
Shun Yao Yang

Current remote attestation schemes in trusted cloud computing lack of dynamic measure scheme of virtual computing nodes. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of virtual computing node running state, and a remote attestation scheme based on the trust measure results and CP-ABE attribute access control. By RO security analysis, and a simulation, we verify the security and efficiency of the program. The trust measure of platform running state is mainly based on the trust rating of the programs running on the platform, and a total trust value of the platform by an algorithm. The trust measure of virtual computing node running state is mainly based on the trust measure of the programs running on the platform and CP-ABE attribute access control. The remote attestation for the trust measure of platform running state is based on CDH problem. In this paper, we carry out simulation experiment with different proportions of non-credible nodes and the experiment results verify the trust evaluation efficiency of the scheme on the virtual machine.


2014 ◽  
Vol 696 ◽  
pp. 161-166 ◽  
Author(s):  
Bo Long Yang ◽  
Hao Guo

In the cloud computing mode TCCP, there exist shortcomings of overburdened trusted TC, the anonymity of nodes and configuration information of platform can’t be guaranteed. In this paper, we propose an anonymous scheme based on attribute certificate. The scheme is achieved by the trusted ring signature based on attribute certificate. By the security analysis, the anonymity and platform configuration information of computing nodes is guaranteed. By simulation experiment, we obtain the efficiency of the scheme. Comparing with Boneh ring signature based on ECC algorithm, this scheme has a great superiority in terms of large amount of ring signatures.


2016 ◽  
Vol 15 (01) ◽  
pp. 1650008 ◽  
Author(s):  
Elias Gonzalez ◽  
Laszlo B. Kish

As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.


2010 ◽  
Vol 33 (7) ◽  
pp. 1165-1176 ◽  
Author(s):  
Ming-Di XU ◽  
Huan-Guo ZHANG ◽  
Heng ZHAO ◽  
Jun-Lin LI ◽  
Fei YAN

2012 ◽  
Vol 229-231 ◽  
pp. 1481-1486 ◽  
Author(s):  
Honarbakhsh Shohreh ◽  
Zamani Mazdak ◽  
Honarbakhsh Roza

This paper, present a novel model to resolve the problems of evaluating trust value of nodes, and prepare a dynamic supervising in ad hoc network as well. Trust evaluation is not only based on direct interactions among nodes, but also observing previous behaviors of nodes, which come from all interactions through the network. This model specially decreases the delay time of selecting a new head for each cluster, which leads to prepare a dynamic monitoring in intra cluster and inter cluster in ad hoc network.


This chapter introduces various ideas to deal with insider attacks using the research directions, which are discussed in earlier chapters such as remote attestation, sealed storage, and integrity measurement. Trusted computing dependent on hardware root of trust has been produced by industry to secure computing frameworks and billions of end points. Remote attestation provides a facility to attestation the required platforms using platform configuration registers (PCR), and sealed storage is used to encrypt the consumer sensitive data using cryptographic operations. Integrity measurements are used to measure the given computing components in respective register. Here, the authors concentrated on a trusted computing paradigm to enable cloud service providers to solve the potential insider attacks at cloud premises.


2011 ◽  
Vol 186 ◽  
pp. 251-255 ◽  
Author(s):  
Jun Feng Tian ◽  
Ye Zhu

Due to not considering the guaranty of trustiness, traditional software development methods and techniques lack effective measures for ensuring trustiness. Combining agent technique with trusted computing provided by TPM, a trusted software construction model based on Trust Shell (TSCMTS) is demonstrated in this paper, where Trust Shell is responsible for ensuring the trustiness of software logically. In particular, for the purpose of improving the accuracy of trustiness constraints, a strategy of determining multiple attributes’ weights by information entropy for check point is proposed. Both simulation experiment results and practical application indicate that the TSCMTS is of effective trustiness and reasonable performance overhead.


2013 ◽  
Vol 321-324 ◽  
pp. 2657-2664
Author(s):  
Fu Xie ◽  
Yun Yun Du

Cloud computing security has become a key problem of restricting the development of cloud computing, solving the cloud computing security problem has been extremely urgent. At present, it has become a new favorite in the cloud computing security research field that trusted computing is used to solve the cloud computing security, this paper uses remote attestation in trusted computing to solve the cloud computing security problems. In a cloud computing environment, the service provider not only needs to provide reliable components, but also needs to ensure that the computing platform system is reliable. In this paper, in view of the characteristics of the cloud computing platform, these two approaches are consolidated and improved, and a proof method based on the component properties and the system behavior (CPTBA) is put forward.


Sign in / Sign up

Export Citation Format

Share Document