期刊文献+

一种云计算环境下代理TCM密码功能的方法

A Method for Delegation of Cryptographic Functions of Trusted Cryptographic Module in Cloud Computing Environment
下载PDF
导出
摘要 云计算已经成为当前计算机技术的研究热点,经过验证,可信计算技术可以有效地解决云计算环境下数据传输的安全性。但是,由于负责提供密码服务的可信密码模块是一枚SOC芯片,其处理速度有限,不能适应云计算环境下频繁数据传输和多用户连接的情况。论文提出了一种云计算环境下的可信密码模块密码功能授权代理的实现方法,通过一级密钥认证授权和保护一级密钥的方法,将可信密码模块的加解密和签名功能代理到每个虚拟机中,每个虚拟机当中能够拥有一个轻量级的密码代理模块完成相关密码功能,提高了整个平台的密码业务处理效率。 It is proved that trusted computing could improve the security of the cloud computing platform. However, in trusted computing technology, the Trusted Cryptographic Module(TCM), which provides basic cryptographic functions, is a SOC chip, whose data process is not high-speed, and is not fit to handle the frequent data transfer and multi-user connection. A method to delegate the TCM cryptographic functions in cloud computing environment is proposed in this paper. In the method, the encryption, decryption and signing functions of TCM are delegated to TCM cryptographic delegation modules in virtual machines. In this way, each virtual machine has a TCM cryptographic delegation module to provide the same crypto- graphic functions as what TCM provides, and it improves the efficiency of the cryptographic process of the cloud computing platform.
作者 赵斌
出处 《计算机与数字工程》 2014年第5期855-858,共4页 Computer & Digital Engineering
关键词 云计算 可信密码模块 密码功能授权代理 cloud computing, trusted cryptographic module, cryptographic functions delegation
  • 相关文献

参考文献10

  • 1Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58.
  • 2SHEN ChangXiang,ZHANG HuangGuo,FENG DengGuo,CAO ZhenFu,HUANG JiWu.Survey of information security[J].Science in China(Series F),2007,50(3):273-298. 被引量:40
  • 3SHEN ChangXiang,ZHANG HuanGuo,WANG HuaiMin,WANG Ji,ZHAO Bo,YAN Fei,YU FaJiang,ZHANG LiQiang,XU MingDi.Research on trusted computing and its development[J].Science China(Information Sciences),2010,53(3):405-433. 被引量:38
  • 4Stumpf F,Eckert C.Enhancing trusted platform modules with hardware-based virtualization techniques[C]//Proc of IEEE Forth Int Confon Emerging Security Information,Systems and Technologies.Piscataway,NJ:IEEE,2010:1-9.
  • 5Krautheim F,Phatak D,Sherman A.Introducing the Trusted Virtual Environment Module:A New Mechanism for Rooting Trust in Cloud Computing[G]//LNCS 6101:Proc of TRUST 2010,Berlin:Springer,2010:211-227.
  • 6何慧,江水,李立号,桑耘.基于TCM的国产化虚拟可信计算平台研究[J].计算机工程,2011,37(S1):63-66. 被引量:7
  • 7中国航天科工集团第二研究院706.一种可信虚拟机平台:中国,CN101957900 B[P/OL].2012-2-15.
  • 8武汉大学.可信密码模块安全虚拟化方法:中国,CN101599025 A[P/OL].2012-7-18.
  • 9联想(北京有限公司).基于可信计算平台的权限委托方法:中国,CN 1992714 A[P/OL].2010-8-25.
  • 10北京工业大学.可信计算平台密钥授权数据管理系统及方法:中国,CN 1988437 A[P/OL].2007-6-27.

二级参考文献27

共引文献76

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部