期刊文献+

可证明安全的可信网络存储协议 被引量:5

Provable secure trusted protocol for network storage
下载PDF
导出
摘要 提出了一种高效的可信网络存储协议,协议只需两轮交互就实现了服务器与用户间的身份认证和密钥协商,同时在协议的第一轮交互中实现了对客户端平台身份的认证和平台完整性校验,改进了原来系统服务器遭受攻击易导致整个系统瘫痪的缺点,提高了系统的可靠性和协议的执行效率,在此基础上建立了用户与智能磁盘间的安全信道。最后利用CK模型证明了协议是SK安全的,用户与磁盘间的信道是安全信道,提高了系统数据的保密性、完整性和不可抵赖性。 A provable secure trusted protocol for NASD was proposed. The protocol will achieve authentication, key agreement and secure channel within two rounds among the server, the disks and the user. At the same time, the protocol could realize the platform authentication and platform integrity verification in the first round of protocol interaction, which would improve the efficiency of the protocol, and prevent the server from malicious attacks effectively. The analysis results show that the protocol is SK-secure by using CK model, which would increase the data confidentiality, integrity and no repudiation.
出处 《通信学报》 EI CSCD 北大核心 2011年第5期169-174,共6页 Journal on Communications
基金 国家科技部重大专项基金资助项目(2011ZX03005-002) 国家自然科学基金资助项目(60872041 61072066) 中央高校基本科研业务费基金资助项目(JY10000903001 JY10000901034)~~
关键词 可证明安全 可信网络接入 NASD 网络存储协议 provable security trusted network access network attached secure disks network storage protocol
  • 相关文献

参考文献15

  • 1KHER V,KIM Y.Securing distributed storage:challenges,techniques,and systems[A].StorageSS'05[C].2005.9-25.
  • 2RIEDEL E,KALLAHALLA M,SWAMINATHAN R.A framework for evaluating storage system security[A].FAST[C].Monterey,CA,2002.15-30.
  • 3GIBSON G A,NAGLE D F,COURTRIGHT W,et al.NASD scalable storage systems[A].Proceedings of the USENIX '99 Extreme Linux Workshop[C].Monterey,CA,USA,1999.121-130.
  • 4BLANCHET B,CHAUDHURI A.Automated formal analysis of a protocol for secure file sharing on untrusted storage[A].IEEE Symposium on Security and Privacy[C].Oakland,CA,2008.417-431.
  • 5GARG D.Proof Theory for Authorization Logic and its Application to a Practical File System[D].CMU,2009.
  • 6BLANCHET B.Automatic verification of correspondences for security protocols[J].Journal of Computer Security,2009,17(4):363-434.
  • 7CHAUDHURI A.On Secure Distributed Implementations of Dynamic Access Control[R].UCSC-CRL-08-01,University of California at Santa Cruz,2008.
  • 8林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 9PEARSON S.Trusted computing:strengths,weaknesses and further opportunities for enhancing privacy[A].Eds iTrust'2005,LNCS 3477[C].Berlin,2005.305-320.
  • 10张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114

二级参考文献55

共引文献660

同被引文献36

引证文献5

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部