chain of trust
Recently Published Documents


TOTAL DOCUMENTS

18
(FIVE YEARS 10)

H-INDEX

2
(FIVE YEARS 1)

2021 ◽  
Vol 2137 (1) ◽  
pp. 012029
Author(s):  
Dazan Qian ◽  
Songhui Guo ◽  
Lei Sun ◽  
Qianfang Hao ◽  
Yunfan Song ◽  
...  

Abstract The deployment of virtual network function (VNF) in the container can realize the 5G service-based architecture (SBA) with high flexibility. The container carrying the VNF has poor isolation and low protection capabilities, and there is a security risk of being tampered and replaced. Current security protection technologies such as access control, intrusion detection, and virus detection cannot ensure that the container is not illegally modified. In order to fundamentally protect the integrity of containerized VNFs, this paper proposes a containerized VNF trust measurement scheme container integrity measurement (CIM). The scheme extends the chain of trust to bare metal containers and virtual machine containers, and experiments are carried out in a containerized VNF communication environment. The results show that the integrity measurement protection scheme is effective. Compared with ordinary containers, the average CPU usage of trusted containers has increased by 26%, and the average memory usage growth rate is less than 1%, the performance overhead caused by CIM is acceptable.


2021 ◽  
Author(s):  
Prashant Hari Narayan Rajput ◽  
Esha Sarkar ◽  
Dimitrios Tychalas ◽  
Michail Maniatakos

Author(s):  
Daniel Schönle ◽  
Kevin Wallis ◽  
Jan Stodt ◽  
Christoph Reich ◽  
Dominik Welte ◽  
...  

Digital transformation strengthens the interconnection of companies in order to develop optimized and better customized, cross-company business models. These models require secure, reliable, and traceable evidence and monitoring of contractually agreed information to gain trust between stakeholders. Blockchain technology using smart contracts allows the industry to establish trust and automate cross-company business processes without the risk of losing data control. A typical cross-company industry use case is equipment maintenance. Machine manufacturers and service providers offer maintenance for their machines and tools in order to achieve high availability at low costs. The aim of this chapter is to demonstrate how maintenance use cases are attempted by utilizing hyperledger fabric for building a chain of trust by hardened evidence logging of the maintenance process to achieve legal certainty. Contracts are digitized into smart contracts automating business that increase the security and mitigate the error-proneness of the business processes.


Author(s):  
Laurent Chuat ◽  
AbdelRahman Abdou ◽  
Ralf Sasse ◽  
Christoph Sprenger ◽  
David Basin ◽  
...  
Keyword(s):  

As we are all aware of current trend of Regional Traffic Office (RTO) system. One has to put a lot of effort in order to get licences from RTO. It is very tedious as well as time consuming process. Otherwise in order to get licences quickly we used to get the help of private agents by paying them much more money which is actually an illegal act according the rules of our government. By which people have to suffer a lot. So, with the help of technology we can convert the present tedious and time wasting process of RTO system into simpler and fruitful one. By this way our project also helps us to reduce the corruption which is present in today’s RTO system by completely removing the role of private agents and the people also automatically get benefited with this new RTO system”. The main aim of designed system in paper is to minimize the corruption by suggesting an ideal module which can be implemented in number of places for number of operation. minimize risk of internal fraud and enhance efficiencies by automating process and minimizing operator intervention, through this we can create an integrated , chain of trust for the identity and issuance process. Creating a secure chain of trust using electronic sensors, microcontroller and embedded programming. This System can be connected to IOT device and we can monitor real time data. Designed system is capable of removing corruption occurring while granting a licence to an applicant, and also capable of avoiding on road accidents caused due to inappropriate driving, because in the system licence will give to the applicant which can drive the vehicle properly.


2020 ◽  
Vol 8 (6) ◽  
pp. 5712-5718

Due to decentralization of Internet of Things(IoT) applications and anything, anytime, anywhere connectivity has increased burden of data processing and decision making at IoT end devices. This overhead initiated new bugs and vulnerabilities thus security threats are emerging and presenting new challenges on these end devices. IoT End Devices rely on Trusted Execution Environments (TEEs) by implementing Root of trust (RoT) as soon as power is on thus forming Chain of trust (CoT) to ensure authenticity, integrity and confidentiality of every bit and byte of Trusted Computing Base (TCB) but due to un-trusted external world connectivity and security flaws such as Spectre and meltdown vulnerabilities present in the TCB of TEE has made CoT unstable and whole TEE are being misutilized. This paper suggests remedial solutions for the threats arising due to bugs and vulnerabilities present in the different components of TCB so as to ensure the stable CoT resulting into robust TEE.


Author(s):  
Israr Khan ◽  
William Farrelly ◽  
Kevin Curran

The authors implement common attacks on a DNS server and demonstrate that DNSSEC is an effective solution to counter DNS security flaws. This research demonstrates how to counter the zone transfer attack via the generation of DNSSEC keys on the name servers which prevent attackers from obtaining a full zone transfer as its request for the transfer without the keys was denied by the primary server. This article also provides a detailed scenario of how DNSSEC can be used as a mechanism to protect against the attack if an attacker tried to perform Cache Poisoning. The authors ultimately show that a DNSSEC server will not accept responses from unauthorised entities and would only accept responses which are authenticated throughout the DNSSEC chain of trust.


2019 ◽  
Vol 16 (8) ◽  
pp. 3252-3258
Author(s):  
S. Arun Kumar ◽  
M. S. Anbarasi

The cloud based services today offers a large amount of services irrespective of the geographical location to individuals or a group. This opens the way to new security dangers to the protection and also the integrity of the information put away. Public Key Infrastructure mechanism, advanced endorsements, computerized marks are existing techniques to accomplish numerous security prerequisite sites, however late dangers make them powerless against genuine assaults when utilized without earlier trust-point establishments. At the time of open reviewing of the information by Third Party Auditor, it is quite possible that it might trade off in protecting client’s privacy. This outcome in two separate issues which represents the dangers of authentication and additionally the trustworthiness of the information that is being shared. In this paper, we propose a Noble Authentication Protocol with privacy preservation policy cloud that gives solid common verification framework utilizing the Pedersen Commitment scheme alongside using ring signature algorithm calculations that will authenticate the TPA and just give the essential data to checking the trustworthiness of the mutual information with keeping the privacy of the clients covered up. The proposed technique helps in staying away from conceivable hash crashes, approving the chain of trust to certificate authorities and different denial records.


Sign in / Sign up

Export Citation Format

Share Document