期刊文献+

一种基于信任协商机制的云服务资源信任验证方法 被引量:3

Trust Negotiation-based Services Verification in Cloud Computing
下载PDF
导出
摘要 云计算环境下,服务资源分布广泛、迁移频繁,资源之间的信任关系不易建立与维护。传统的可信计算远程验证方法存在性能瓶颈和计算复杂等问题。在研究云服务资源信任验证方法的基础上,提出一种属性协商的远程验证方法。采用环签名算法和基于属性的敏感信息保护机制,提高了信任验证计算效率,减小了敏感信息泄露的风险。设计的安全模型证明了方法的安全性。通过Hadoop平台下的实验,验证了方法的有效性和可行性。 In cloud computing, the resources of service are widely distributed and migrated frequently. The trust rela- tionship between them is hard to establish and maintain. There are some problems for traditional remote attestation based on trust computing, such as performance bottleneck and computational-complexity. This article proposed a novel remote attestation mechanism based on property negotiation in cloud computing. According to the ring signature algo- rism and sensitive property-based protection, this mechanism promotes the computational efficiency and reduces the leakage risk of sensitive property. Security of the mechanism is verified by security model. Validity and feasibility are tested by the experiment on Hadoop platform.
出处 《计算机科学》 CSCD 北大核心 2013年第7期107-112,共6页 Computer Science
基金 国家"十一五"科技支撑计划项目(2006BAF01A00)资助
关键词 云计算 可信计算 远程证明 环签名 自动信任协商 Cloud computing, Trust computing, Remote attestation, Ring signature, Automated trust negotiation
  • 相关文献

参考文献14

  • 1Santos N, Krishna P. Towards Trusted Cloud Computing[A]// HotCloud'09 Proceedings of the 2009 con{erence on Hot topics in cloud computing, 2009[C]. CA, USA: USENIX, 2009 : 22.
  • 2Armbrust,Michael, Fox, et al. A view of cloud computing[J]. Communication of the ACM, 2010(4) :50-58.
  • 3Trusted Computing Group. Trusted Computing Platform Alli- ance main specification version 1. lb[EB/OL] http//www. Trustedeomputinggroup. org, 2011-11.
  • 4Trusted Computing Group. Trusted Computing Platform Alli- ance main specification version 1. 2 [EB/OL]. http//www. Trustedeomputinggroup. org, 2012-08.
  • 5Briekell E, Chen Li-qun, Li Jiang-tao. A New Direct Anonymous Attestation Scheme from Bilinear Maps[J]. Lecture Notes in Computer Science, 2008(4968/2008) : 166-178.
  • 6Chen Li-qurL A DAA scheme requiring less TPM resources[J]. Lecture Notes in Computer Science, 2011(6151):350-365.
  • 7周彦伟,吴振强,蒋李.分布式网络环境下的跨域匿名认证机制[J].计算机应用,2010,30(8):2120-2124. 被引量:10
  • 8Haldar V, Chandra D, Franz M. Semantic Remote Attestation-A Virtual Machine directed approach to Trusted Computing[A]// USENIX Virtual Machine Research and Technology Symposium [C]. 2004.
  • 9Chen Li-qun, L6hr H, Manulis M. Property-Based Attestation without a Trusted Third Party[J]. Lecture Notes in Computer Science, 2008(5222) : 31-46.
  • 10刘吉强,赵佳,赵勇.可信计算中远程自动匿名证明的研究[J].计算机学报,2009,32(7):1304-1310. 被引量:18

二级参考文献27

  • 1张帆,马建峰,文相在.通用可组合的匿名HASH认证模型[J].中国科学(E辑),2007,37(2):272-284. 被引量:5
  • 2Trusted Computing Group.Trusted Computing Platform Alliance main specification version 1.1b[EB/OL].[2009-11-10].http://www.Trustedcomputinggroup.org.
  • 3Trusted Computing Group.TPM main part 1 design principles specification version 1.2[EB/OL].[2009-12-01].http://www.Trustedcomputinggroup.org.
  • 4BRICKELL E,CAMENISCH J,CHEN L.Direct anonymous attestation[C] // Proceedings of the 11th ACM Conference on Computer and Communications Security.New York:ACM,2004:132-145.
  • 5BRICKELL E,CHEN L,LI J.Simplified security notions of direct anonymous attestation and a concrete scheme from pairings[R].Cryptology Reprint Archive,2008.
  • 6Trusted Computing Group.Trusted Computing Group TPM vl.2 Specification Changes:a Summary of Changes with respect to the v1.1b TPM Specification[EB/OL].[2009-12-10].http://www.trustedcomputinggroup.org.
  • 7GOLDWASSER S,MICALI S,RIVEST R.A digital signature scheme secure against adaptive chosen-message attacks[J].SIAM Journal on Computing,1998,17(2):281-308.
  • 8Brickell Ernest F, Camenisch Jan, Chen Li-Qun. Direct anonymous attestation//Proceedings of the ACM Conference on Computer and Communications Security. Washington, DC, 2004, 132-145.
  • 9Camenisch J, Stadler M. Efficient group signature schemes for large groups//Kaliski B eds. Advances in Cryptology- CRYPTO'97. LNCS 1296. Springer Verlag, 1997:410-424.
  • 10Fiat A, Shamir A. How to prove yourself: Practical solutions to identification and signature problems//Proceedings of the CRYPTO'86. LNCS 263. Springer Verlag, 1986. 186-194.

共引文献46

同被引文献24

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部