期刊文献+

基于可逆向扩展的可信数据封装存储方案 被引量:3

Trusted computing sealing scheme based on reverse extending
下载PDF
导出
摘要 针对封装存储在应用层多任务环境下不能实现异步封装解封操作,提出了一种改进的可信数据封装存储方案,在可信密码模块(TCM)中引入了一个新的寄存器PCR_R,利用可逆向的度量值扩展方案保证平台应用层状态一致,同时利用可信报告根(RTR)和存储度量日志(SML)提供的实时可信状态证明,在应用层多任务环境下实现了异步封装解封操作。 Data sealing can not achieve asynchronous sealing and unsealing operation in application layer multitasking environment. To overcome this problem, we propose an improved sealing approach for trusted computing, in which a new register PCR_R is introduced into TCM. It uses the metrics reversible extending scheme to guarantee the state of platform in application layer unanimous. The improved sealing approach also uses the real-time validation of trusting state provided by Root of Trust for Reporting (RTR) and Stored Measurement Log (SML) to solve the asynchronous sealing and unsealing operation in application layer multitasking environment.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2012年第4期985-991,共7页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金项目(60951001) 国家科技支撑计划重点项目(2009BAH52B06) 北京市自然科学基金项目(4102057) 国家发改委信息安全产品产业化专项基金项目([2009]1886) 中央高校基本科研业务费专项项目 北京电子科技学院信息安全重点实验室基金项目
关键词 计算机应用 可信计算 可信密码模块 数据封装 PCR扩展 computer application trusted computing trusted cryptography module (TCM) datasealing PCR extend
  • 相关文献

参考文献10

  • 1沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 2张焕国,罗捷,金刚,朱智强,余发江,严飞.可信计算研究进展[J].武汉大学学报(理学版),2006,52(5):513-518. 被引量:114
  • 3Trusted Computing Group. TCG specification archi- tecture overview specification. Revision 1. 4. [EB/ OL]. [2010-07-27]. http://www, trustedco-mput- inggroup, org.
  • 4Trusted Computing Group. TPM main part 3 corn-mands, specification version 1.2, Level 2 Revision 103[EB/OL]. [2010-07-27]. http..//www, trusted- computinggroup, org.
  • 5Ulrich Kuhn, Marcel Selhorst, Christian Stuble. Realizing property-based attestation and sealing with commonly available hard-and software [C]//Pro- ceeding of the 2007 ACM Workshop on Scalable Trusted Computing, Alexandria, Virginia, USA, 2007: 50-57.
  • 6Wang Dan, Feng Deng-guo. A hypervisor-based se- cure storage scheme[C]//Proceeding of the Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, China, 2010: 81-86.
  • 7Elior Vila, Plamenka Borovska. Data protection uti- lizing trusted platform module[C]///Proceedings of the 9th International Conference on Computer Sys- tems and Technologies and Workshop for PhD Students in Computing, Gabrovo, Bulgaria, 2008:1-6.
  • 8Emanuele Cesena, Gianluca Ramunno, Davide Ver- nizzi. Secure storage using a sealing proxy[C]/// Proceedings of the ACM SIGOPS European Work- shop on System Security (EUROSEC), Glasgow, Scotland, 2008 : 27-34.
  • 9赵波,张焕国,李晶,陈璐,文松.可信PDA计算平台系统结构与安全机制[J].计算机学报,2010,33(1):82-92. 被引量:49
  • 10刘孜文,冯登国.基于可信计算的动态完整性度量架构[J].电子与信息学报,2010,32(4):875-879. 被引量:46

二级参考文献51

共引文献512

同被引文献23

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部