期刊文献+

远程证明安全协议的设计与验证 被引量:2

Design and validation for a remote attestation security protocol
下载PDF
导出
摘要 通过对现有远程证明协议交互协议的分析,提出了一种改进的远程证明协议。为了验证该协议是否符合安全需求,采用安全协议形式化分析方法中的基于攻击类的CSP方法对协议进行了CSP建模,同时通过对模型进行的FDR检测,发现了协议中存在的漏洞,给出了漏洞的修改方案。经过再次验证得到了符合安全需求的安全协议。该协议可用于可信计算的远程证明,能够保证远程证明的正确完成和交互过程中消息的保密性、完整性、认证性及新鲜性。 By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.
出处 《通信学报》 EI CSCD 北大核心 2009年第S2期29-36,共8页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311106) 北京市属市管高等学校人才强教计划资助项目~~
关键词 可信计算 远程证明 安全协议 CSP trusted computing remote attestation security protocol CSP
  • 相关文献

参考文献8

二级参考文献63

  • 1RuiXue Deng-GuoFeng.New Semantic Model for Authentication Protocols in ASMs[J].Journal of Computer Science & Technology,2004,19(4):555-563. 被引量:5
  • 2王超,朱建明,马建峰.基于组件的软件系统可用性分析[J].西安电子科技大学学报,2004,31(5):781-784. 被引量:9
  • 3ZHANG Huanguo WANG Fan.A Behavior-Based Remote Trust Attestation Model[J].Wuhan University Journal of Natural Sciences,2006,11(6):1819-1822. 被引量:10
  • 4Grawrock D. TCG Specification Architecture Overview Revision 1.4. [EB/OL]. [2007-10-01 ]. https://www. trustedcomputinggroup. org/groups/TCG _ 1 _ 4. Architecture _ Overview. pdf.
  • 5Sadeghi A, Stuble C. Property-based Attestation for Computing Platforms: Caring About Properties, Not Mechanisms [C]//Proceedings of New Security Paradigms Workshop 2004. New York: Association for Computing Machinery, 2004: 67-77.
  • 6Chen L, Landfermann R, Lohr H. A Protocol for Property-based Attestation[C]//Proceedings of the First ACM Workshop on Scalable Trusted Computing. New York: Association for Computing Machinery, 2006: 7-16.
  • 7Haldar V. Semantic Remote Attestation[D]. Irvine: University of California, 2006.
  • 8Seshadri A, Perrig A, Doorn L. SWATT: SoftWare-based ATT-estation for Embedded Devices[C]//Proceedings of 2004 IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2004: 272-282.
  • 9Brickell E, Camenisch J, Chen L. Direct Anonymous Attestation[C]//Proceedings of 2004 ACM Conference on Computer and Communications Security. New York: Association for Computing Machinery, 2004: 132-145.
  • 10Yoshihama S, Ebringer T, Nakamura M, et al. WS-Attestation.. Efficient and Fine-Grained Remote Attestation on Web Services[C]//Proceedings of 2005 IEEE International Conference on Web Services. Washington.. Computer Society, 2005 : 743-750.

共引文献109

同被引文献22

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2李尚杰,贺也平,刘冬梅,袁春阳.基于属性的远程证明的隐私性分析[J].通信学报,2009,30(S2):146-152. 被引量:8
  • 3沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 4Jessica E V. Google discloses privacy glitch[01]. http:// blogs. wsj .com/ digits/2009 /03/08/1214/, 2012.8.31.
  • 5Michael K. Medie.Max/the linkup: when the cloud fails[01]. http://www.zdnet.com/blog/projectfailures/mediamax-the-l inkup- when-the-cloud-fails/999, 2012.8.3l.
  • 6Greenberg A. cloud computing's stormy side[01]. http:// www.forbes.com/2008/02/17 /web-application-cloud-tech-int el-cx _ ag_ 0219cloud.html, 2012.8.3l.
  • 7Blundo C, Cimato S, De Capitani di Vimercati S, et al.. Efficient key management for enforcing access control in outsourced scenarios[C]. IFIP Advances in Information and Communication Technology, Boston, 2009: 364-375.
  • 8Atallah MJ, Blanton M, Fazio N, et al.. Dynamic and efficient key management for access hierarchies[C]. ACM Transactions on Information and System Security, Alexandria, 2009: 1-43.
  • 9Wang W, Li Z, Owens R, et al.. Secure and efficient access to out sourced data[C]. Proceedings of the 2009 ACM Workshop on Cloud Computing Security, Chicago, 2009: 55-66.
  • 10Zhou Miao, Mu Yi, Susilo W, et al .. Privacy enhanced data outsourcing in the cloud[J].Journal of Network and Computer Applications, 2012, 35(4): 1367-1373.

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部