期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Dynamic Integrity Measurement Model Based on vTPM 被引量:2
1
作者 ruizhong du Wangyang Pan Junfeng Tian 《China Communications》 SCIE CSCD 2018年第2期88-99,共12页
With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has bec... With the development of cloud computing, virtualization technology has been widely used in our life. Meanwhile, it became one of the key targets for some attackers. The integrity measurement in virtual machine has become an urgent problem. Some of the existing virtualization platform integrity measurement mechanism introduces the trusted computing technology, according to a trusted chain that the Trusted Platform Module(TPM) established for trusted root to measure the integrity of process in static. But this single chain static measurement cannot ensure the dynamic credible in platform running. To solve the problem that the virtual trusted platform can not guarantee the dynamic credibility, this paper put forward Dynamic Integrity Measurement Model(DIMM) based on virtual Trusted Platform Module(v TPM) which had been implemented with typical virtual machine monitor Xen as an example. DIMM combined with virtual machine introspection and event capture technology to ensure the security of the entire user domain. Based on the framework, this paper put forward Self-modify dynamic measurement strategy which can effectively reduce the measurement frequency and improve the measurement performance. Finally, it is proved that the validity and feasibility of the proposed model with comparison experiments. 展开更多
关键词 测量模型 虚拟化技术 计算技术 虚拟机 静电干扰 DIMM 测量策略 测量频率
下载PDF
Privacy-Preserving Searchable Encryption Scheme Based on Public and Private Blockchains
2
作者 ruizhong du Caixia Ma Mingyue Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第1期13-26,共14页
While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encry... While users enjoy the convenience of data outsourcing in the cloud,they also face the risks of data modification and private information leakage.Searchable encryption technology can perform keyword searches over encrypted data while protecting their privacy and guaranteeing the integrity of the data by verifying the search results.However,some associated problems are still encountered,such as the low efficiency of verification and uncontrollable query results.Accordingly,this paper proposes a Privacy-Preserving Searchable Encryption(PPSE)scheme based on public and private blockchains.First,we store an encrypted index in a private blockchain while outsourcing corresponding encrypted documents to a public blockchain.The encrypted documents are located through the encrypted index.This method can reduce the storage overhead on the blockchains,and improve the efficiency of transaction execution and the security of stored data.Moreover,we adopt a smart contract to introduce a secondary verification access control mechanism and restrict data users’access to the private blockchain through authorization for the purpose of guaranteeing data privacy and the correctness of access control verification.Finally,the security analysis and experimental results indicate that compared with existing schemes,the proposed scheme can not only improve the security of encrypted data but also guarantee the efficiency of the query. 展开更多
关键词 private blockchain public blockchain access control forward privacy backward privacy
原文传递
An Attribute-Based Encryption Scheme Based on Unrecognizable Trapdoors
3
作者 ruizhong du Ailun Tan Junfeng Tian 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2020年第5期579-588,共10页
Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In t... Attribute-Based Encryption (ABE) has been widely used for ciphertext retrieval in the cloud environment.However,bi-flexible attribute control and privacy keywords are difficult problems that have yet to be solved.In this paper,we introduce the denial of access policy and the mutual matching algorithm of a dataset used to realize bidirectional control of attributes in the cloud server.To solve the problem of keyword privacy,we construct a security trapdoor by adding random numbers that effectively resist keyword guessing attacks from cloud servers and external attackers.System security is reduced to the Deterministic Bilinear Diffie-Hellman (DBDH) hypothesis problem.We validate our scheme through theoretical security analysis and experimental verification.Experiments are conducted on a real dataset,and results show that the scheme has higher security and retrieval efficiency than previous methods. 展开更多
关键词 Attribute-Based Encryption(ABE) unrecognizable trapdoor two-way access strategy ciphertext search
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部