期刊文献+

一种可信虚拟平台底层环境验证方案 被引量:2

A VERIFICATION SCHEME FOR TRUSTED VIRTUAL PLATFORM ENVIRONMENT
下载PDF
导出
摘要 分析IBM的vTPM方案缺乏对可信虚拟平台底层环境隐私保护的问题,提出一种具有平台底层隐私保护的底层环境验证方案。改变IBM方案中的物理PCR与vPCR映射关系、远程证明方案,防止上层虚拟机获取底层配置信息;提出可信虚拟平台下的二级远程证明方案;设计可信验证模块,建立底层平台环境完整性、安全策略的静态和动态验证机制。实验结果表明,该方案能够在平台底层隐私保护前提下为用户进行平台底层环境验证,建立用户对底层平台的信任关系。 IBM’s vTPM solution lacks the privacy protection of the underlying environment of the trusted virtual platform, so an underlying environment verification scheme to the underlying platform privacy protection is proposed. We changed the mapping relationship between physical PCR and vPCR and remote attestation scheme in IBM solution, to prevent upper-layer virtual machine from getting the underlying configuration information. We proposed the second-level remote attestation scheme on trusted virtual platform and designed trusted verification module to establish the static and dynamic verification mechanism for the environmental integrity of the underlying platform and security policy. The experimental results show that this scheme can verify the underlying environment of the platform under the premise of protecting the underlying privacy of the platform and establish the trust relationship between users and the underlying platform.
作者 孙浩男 鹤荣育 郭丽 Sun Haonan1,He Rongyu1,Guo Li2(1.PLA Information Engineering University, Zhengzhou 450001, Henan,China;2.Henan Province Industrial Technology School, Zhengzhou 450001, Henan, Chin)
出处 《计算机应用与软件》 北大核心 2018年第8期307-313,328,共8页 Computer Applications and Software
基金 国家自然科学基金项目(61572517)
关键词 隐私保护 二级远程证明 可信验证模块 信任传递 Privacy protection Second-level remote attestation Trusted verification module Trust transfer
  • 相关文献

参考文献7

二级参考文献80

  • 1张焕国,严飞,傅建明,徐明迪,杨飏,何凡,詹静.可信计算平台测评理论与关键技术研究[J].中国科学:信息科学,2010,40(2):167-188. 被引量:13
  • 2王立斌,陈克非.基于程序设计语言的安全模型[J].信息安全与通信保密,2005,27(7):214-218. 被引量:3
  • 3周伟,尹青,王清贤.进程代数上的抽象安全性质[J].计算机研究与发展,2005,42(12):2100-2105. 被引量:2
  • 4国家密码管理局.可信计算密码支撑平台功能与接口规范[S].2007.
  • 5Abadi M,Wobber T.A logical account of NGSCB//Proceedings of the Formal Techniques for Networked and Distributed Systems,FORTE 2004.Madrid,Spain.LNCS 3235.2004:1-12.
  • 6Chen S,Wen Y,Zhao H.Formal analysis of secure bootstrap in trusted computing//Proceedings of the 4th International Conference on Autonomic and Trusted Computing.Hong Kong,China.LNCS 4610.Springer,2007:352-360.
  • 7Gürgens S,Rudolph C,Scheuermann D et al.Security evaluation of scenarios based on the TCG's TPM specification//Biskp Joachim,Lopez Javier eds.Proceedings of the 12th European Symposium on Research in Computer Security(ESORICS).Dresder,Germany.LNCS 4734.Springer,2007:438-453.
  • 8Millen J,Guttman J,Ramsdell J et al.Analysis of a measured launck The MITRE Corporation,Bedford,MA:Technical Reports 07-0843,2007.
  • 9Lin A H.Automated analysis of security apis[M.S.dissertation] .Massachusetts Institute of Technology,2005.
  • 10Deepak G,Jason F,Dilsun K et al.Towards a theory of secure systems.Cylab,Carnegie Mellon University,Pattsburgh,PA:Technical Reports CMU-CyLab-08-003,2008.

共引文献61

同被引文献18

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部