期刊文献+
共找到610篇文章
< 1 2 31 >
每页显示 20 50 100
Efficient Property-Based Remote Attestation Scheme
1
作者 Zhang Yichen Li Jiguo Sun Chuanming 《China Communications》 SCIE CSCD 2012年第10期1-9,共9页
In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, forrml security model of property-based remote attestation is proposed, with which we prove that the user p... In order to ensure the security of the property-based remote attestation scheme, an improved, more efficient, forrml security model of property-based remote attestation is proposed, with which we prove that the user platform satis- fies the security property requirements predefmed by a remote relying party. Under the co-Corrtautational Diffie-Helknan (CDH) assumption, the proposed scheme is proved to be secure in the random oracle model. Compared with the existing schemes, the proposed scheme has a short property certificate and signature size, and requires less computational cost. 展开更多
关键词 trusted computing remote attestation PAIRING co-CDH assumption
下载PDF
A Behavior-Based Remote Trust Attestation Model 被引量:10
2
作者 ZHANG Huanguo WANG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1819-1822,共4页
While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of runni... While remote trust attestation is a useful concept to detect unauthorized changes to software, the current mechanism only ensures authenticity at the start of the operating system and cannot ensure the action of running software. Our approach is to use a behavior-based monitoring agent to make remote attestation more flexible, dynamic, and trustworthy. This approach was mostly made possible by extensive use of process information which is readily available in Unix. We also made use of a behavior tree to effectively record predictable behaviors of each process. In this paper, we primarily focus on building a prototype implementation of such framework, presenting one example built on it, successfully find potential security risks in the run time of a ftp program and then evaluate the performance of this model. 展开更多
关键词 remote attestation trusted computing trusted platform behavior monitoring agent behavior tree
下载PDF
A Method to Implement Full Anonymous Attestation for Trusted Computing Platform 被引量:3
3
作者 HAO Liming SUN Xun YANG Shutang LU Songnian 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期101-104,共4页
Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w... Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity. 展开更多
关键词 trusted computing trusted platform module direct anonymous attestation
下载PDF
A Novel Direct Anonymous Attestation Protocol Based on Zero Knowledge Proof for Different Trusted Domains 被引量:3
4
作者 YANG Yatao CAO Lulin LI Zichen 《China Communications》 SCIE CSCD 2010年第4期172-175,共4页
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ... In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field. 展开更多
关键词 Network Security Trusted Computing Direct Anonymous attestation Trusted Domain.
下载PDF
A Trusted Attestation Mechanism for the Sensing Nodes of Internet of Things Based on Dynamic Trusted Measurement 被引量:10
5
作者 Bei Gong Yubo Wang +2 位作者 Xiangang Liu Fazhi Qi Zhihui Sun 《China Communications》 SCIE CSCD 2018年第2期100-121,共22页
Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the... Internet of things has been widely applied to industrial control, smart city and environmental protection, in these applica- tion scenarios, sensing node needs to make real-time response to the feedback control of the application layer. Therefore, it is nec- essary to monitor whether or not awareness nodes are trusted in real time, but the existing mechanisms for trusted certification lack the real-time measurement and tracking of the sensing node. To solve the above problems, this paper proposes a dynamic metric based authentication mechanism for sensing nodes of Internet of things. Firstly, the dynamic trustworthiness measure of the sensing nodes is carried out by introducing the computational function such as the trust function, the trust- worthiness risk assessment function, the feed- back control function and the active function of the sensing node. The dynamic trustworthi- ness measure of sensing nodes from multiple dimensions can effectively describe the change of trusted value of sensing nodes. Then, on the basis of this, a trusted attestation based on node trusted measure is realized by using the revocable group signature mechanism of local verifier. The mechanism has anonymity, un- forgeability and traceability, which is proved the security in the standard model. Simulationexperiments show that the proposed trusted attestation mechanism is flexible, practical and ef|Scient and has better attack resistance. It can effectively guarantee the reliable data transmission of nodes and realize the dynamic tracking of node reliability, which has a lower impact on system performance. 展开更多
关键词 internet of things: trusted mea-surement trusted attestation group signature
下载PDF
An Enhanced Direct Anonymous Attestation Scheme with Mutual Authentication for Network-Connected UAV Communication Systems 被引量:3
6
作者 Liquan Chen Sijie Qian +1 位作者 Ming Lim Shihui Wang 《China Communications》 SCIE CSCD 2018年第5期61-76,共16页
In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anony... In network-connected UAV(NCUAV) communication systems, user authentication is replaced by platform identity authentication and integrity check because many NC-UAVs are operated without human intervention. Direct anonymous attestation(DAA) is an attractive cryptographic scheme that provides an elegant balance between platform authentication and anonymity. However, because of the low-level computing capability and limited transmission bandwidth in UAV, the existing DAA schemes are not suitable for NC-UAV communication systems. In this paper, we propose an enhanced DAA scheme with mutual authentication(MA-DAA scheme), which meets the security requirements of NC-UAV communication systems. The proposed MA-DAA scheme, which is based on asymmetric pairings, bundles the identities of trusted platform module(TPM) and Host to solve the malicious module changing attacks. Credential randomization, batch proof and verification, and mutual authentication are realized in the MA-DAA scheme. The computational workload in TPM and Host is reduced in order to meet the low computation and resource requirements in TPM and Host.The entire scheme and protocols are presented,and the security and efficiency of the proposed MA-DAA scheme are proved and analyzed.Our experiment results also confirm the high efficiency of the proposed scheme. 展开更多
关键词 network-connected UAV trusted computing direct anonymous attestation mutual authentication trusted platform module
下载PDF
Towards a Source-Code Oriented Attestation 被引量:1
7
作者 Ruan Anbang Shen Qingni +3 位作者 Wang Li Qin Chao Gu Liang Chen Zhong 《China Communications》 SCIE CSCD 2009年第4期82-87,共6页
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ... The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports the attestation for specific patterns of binary codes defined by a trusted party, mostly the software vendor, for a particular version of a software. In this paper, we present a Source-Code Oriented Attestation (SCOA) framework to enable custom built application to be attested to in the TCG attestation architecture. In SCOA, security attributes are bond with the source codes of an application instead of its binaries codes. With a proof chain generated by a Trusted Building System to record the building procedure, the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes. Moreover, with the security attribute certificates assigned to the source codes, they can determine the trustworthiness of the binary. In this paper, we present a TBS implementation with virtualization. 展开更多
关键词 remote attestation trusted building system VIRTUALIZATION source-code
下载PDF
SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications
8
作者 Nasa Ahmed Manar Abu Talib Qassim Nasir 《Computers, Materials & Continua》 SCIE EI 2021年第4期23-49,共27页
Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platf... Security is one of the major challenges that devices connected to the Internet of Things(IoT)face today.Remote attestation is used to measure these devices’trustworthiness on the network by measuring the device platform’s integrity.Several software-based attestation mechanisms have been proposed,but none of them can detect runtime attacks.Although some researchers have attempted to tackle these attacks,the proposed techniques require additional secured hardware parts to be integrated with the attested devices to achieve their aim.These solutions are expensive and not suitable in many cases.This paper proposes a dual attestation process,SAPEM,with two phases:static and dynamic.The static attestation phase examines the program memory of the attested device.The dynamic program ow attestation examines the execution correctness of the application code.It can detect code injection and runtime attacks that hijack the control-ow,including data attacks that affect the program control-ow.The main aim is to minimize attestation overhead while maintaining our ability to detect the specied attacks.We validated SAPEM by implementing it on Raspberry Pi using its TrustZone extension.We attested it against the specied attacks and compared its performance with the related work in the literature.The results show that SAPEM signicantly minimizes performance overhead while reliably detecting runtime attacks at the binary level. 展开更多
关键词 IOT remote attestation runtime attacks TRUST TRUSTZONE security
下载PDF
域间路由安全增强及区块链技术的应用研究
9
作者 王群 李馥娟 +2 位作者 倪雪莉 夏玲玲 马卓 《计算机科学与探索》 CSCD 北大核心 2024年第12期3144-3174,共31页
边界网关协议(BGP)是目前互联网中事实上的域间路由标准,其安全性建立在自治系统(AS)身份及路径真实完整基础上,但BGP自身缺乏相应的安全保障机制,其安全问题备受关注。区块链作为构建新一代信息基础设施的创新技术,支撑在开放互联网环... 边界网关协议(BGP)是目前互联网中事实上的域间路由标准,其安全性建立在自治系统(AS)身份及路径真实完整基础上,但BGP自身缺乏相应的安全保障机制,其安全问题备受关注。区块链作为构建新一代信息基础设施的创新技术,支撑在开放互联网环境中构建分布式多方信任体系,为当前传统BGP安全增强中遇到的问题和挑战提供了技术应对。根据技术发展和安全迭代,将BGP安全增强划分为3个递进阶段:以安全边界网关协议(S-BGP)为代表的理论创新阶段,以资源公钥基础设施(RPKI)为安全基础的应用实践阶段,以及基于区块链技术的创新发展阶段。分析BGP路由传播方式和路由策略的脆弱性,以及前缀劫持、路径伪造和路由泄露3类典型的安全威胁方式;梳理传统BGP安全增强技术路线和研究脉络,重点从主动防御和异常检测两个方面讨论针对错误路由宣告攻击的应对机制;在简要介绍区块链技术基本原理的基础上,利用区块链的去中心化、防篡改、可溯源、分布式部署等特性,重点探讨基于区块链的BGP安全增强技术的实现思想、路径和方法;主要结合区块链技术的应用,讨论BGP安全增强中面临的挑战,并对未来研究方向进行展望。 展开更多
关键词 边界网关协议 安全增强 区块链 资源公钥基础设施 路由认证
下载PDF
基于动态完整性度量的机密计算运行时监控方案
10
作者 李为 冯伟 +1 位作者 秦宇 冯登国 《计算机研究与发展》 EI CSCD 北大核心 2024年第10期2482-2500,共19页
机密计算(confidential computing,CC)技术基于硬件可信执行环境(TEE),通过隔离、完整性度量和远程证明等技术保护使用中数据的机密性和完整性,并免受特权敌手的攻击.然而,现有机密计算平台的完整性度量和远程证明机制主要针对启动时,... 机密计算(confidential computing,CC)技术基于硬件可信执行环境(TEE),通过隔离、完整性度量和远程证明等技术保护使用中数据的机密性和完整性,并免受特权敌手的攻击.然而,现有机密计算平台的完整性度量和远程证明机制主要针对启动时,而缺少运行时完整性保护,例如当用户工作负载潜在的内存漏洞被敌手利用时容易遭受控制流劫持等攻击,目前仅包含启动时完整性保护的机密计算平台无法有效防止或者检测此类运行时攻击.针对该问题,提出了一种基于动态完整性度量的机密计算运行时监控方案,通过向TEE中引入控制流和数据流度量,并扩展可信验证方功能以进行运行时远程证明,实现了机密计算平台内用户工作负载的运行时完整性保护.使用CSV/SEV服务器作为机密计算平台,在其机密虚拟机/容器基础上进行了系统原型实现与实验评估,评估结果表明,方案在增强运行时安全性的同时,引入了约16%的性能损耗. 展开更多
关键词 机密计算 可信执行环境 运行时证明 控制流完整性 数据流完整性
下载PDF
基于远程证明的数据服务完整性验证方法
11
作者 张溯 张颖 +1 位作者 张伟 黄罡 《软件学报》 EI CSCD 北大核心 2024年第11期4949-4972,共24页
数据作为一种新型生产要素,需要在不同主体间流通以发挥价值.在这一过程中,数据需要确保其完整性,避免受到未经授权的篡改,否则可能导致极为严重的后果.现有工作通过将分布式账本与数据加密、校验技术结合实现数据存证以证明待流通数据... 数据作为一种新型生产要素,需要在不同主体间流通以发挥价值.在这一过程中,数据需要确保其完整性,避免受到未经授权的篡改,否则可能导致极为严重的后果.现有工作通过将分布式账本与数据加密、校验技术结合实现数据存证以证明待流通数据在传输、存储等环节中未受篡改,保障数据的完整性.然而,此类工作难以确认数据供方所提供数据本身的完整性,一旦数据供方主动或被动提供了伪造数据,后续完整性保障工作将失去意义.为此,提出一种基于远程证明的数据服务完整性验证方法,所提方法以可信执行环境作为信任锚,对特定数据服务静态代码、执行过程和执行结果的完整性进行多维度量与验证,并通过程序切片优化对特定数据服务的完整性验证,从而将数据完整性保障的范围延伸至数据供方提供数据的环节.通过在3个真实Java信息系统中25个数据服务上的一系列实验验证了所提出方法的有效性. 展开更多
关键词 数据服务 数据完整性 远程证明 控制流证明 可信执行环境
下载PDF
可信执行环境:现状与展望 被引量:2
12
作者 张锋巍 周雷 +2 位作者 张一鸣 任明德 邓韵杰 《计算机研究与发展》 EI CSCD 北大核心 2024年第1期243-260,共18页
当前在云服务、移动社交网络下用户普遍追求隐私保护、安全计算,从而推动了隐私计算、机密计算等领域的快速发展.可信执行环境(trusted execution environment,TEE)作为机密计算服务中重要的技术基础已经广泛部署到各类计算平台中.目前,... 当前在云服务、移动社交网络下用户普遍追求隐私保护、安全计算,从而推动了隐私计算、机密计算等领域的快速发展.可信执行环境(trusted execution environment,TEE)作为机密计算服务中重要的技术基础已经广泛部署到各类计算平台中.目前,以Intel,Arm等为代表的设备制造商采用软硬件隔离机制,推出了多类实用TEE技术并不断迭代更新,从功能上更加方便设备管理者、普通用户使用安全服务.研究人员则根据不同的系统架构和应用需求,优化TEE模型,扩大可信应用领域并提升其工作效率.全面分析主流系统架构(包括x86、Arm、RISC-V、异构计算单元)中TEE技术发展路线、技术特点包括基础硬件设施设计、软件接口定义、安全边界等,挖掘TEE技术可行的应用场景.同时,分析各类TEE技术面临的挑战,探讨TEE技术局限性以及自身面临的安全风险如侧信道攻击等.在此基础上,从安全性、功能性等方面总结各类TEE技术优缺点,并提出TEE技术未来的发展思路. 展开更多
关键词 可信执行环境 操作系统架构 内存隔离 处理器模式 安全性验证
下载PDF
Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure:A Practice of Cryptography Approach
13
作者 Mingxing Zhou Peng Xiao +3 位作者 Qixu Wang Shuhua Ruan Xingshu Chen Menglong Yang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期957-979,共23页
Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integra... Due to the need for massive device connectivity,low communication latency,and various customizations in 6G architecture,a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario.However,the openness and heterogeneity of the 6G network cause the problems of network security.To improve the trustworthiness of 6G networks,we propose a trusted computing-based approach for establishing trust relationships inmulti-cloud scenarios.The proposed method shows the relationship of trust based on dual-level verification.It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.Firstly,SM3 algorithm establishes the chain of trust for the system’s trusted boot phase.Then,the remote attestation server(RAS)of distributed cloud units verifies the physical servers.Meanwhile,the physical servers use a ring approach to verify the cloud servers.Eventually,the centralized RAS takes one-time authentication to the critical evidence information of distributed cloud unit servers.Simultaneously,the centralized RAS also verifies the evidence of distributed RAS.We establish our proposed approach in a natural OpenStack-based cloud environment.The simulation results show that the proposed method achieves higher security with less than a 1%system performance loss. 展开更多
关键词 6G multi-cloud trusted Infrastructure remote attestation commercial cipher
下载PDF
师范认证背景下“心理学基础”课程教学新探索
14
作者 郑先如 《龙岩学院学报》 2023年第6期124-128,共5页
师范认证对培养师范类专业人才提出了新理念、新标准、新要求。“心理学基础”作为师范类专业的教育方向课程应该发挥其特有作用,课程建设必须特别重视课堂教学与实践教学两大环节,并且实现它们的积极结合。课堂教学与实践教学也是实现... 师范认证对培养师范类专业人才提出了新理念、新标准、新要求。“心理学基础”作为师范类专业的教育方向课程应该发挥其特有作用,课程建设必须特别重视课堂教学与实践教学两大环节,并且实现它们的积极结合。课堂教学与实践教学也是实现培养目标的两条路径,应着力打通它们在专业人才培养上的稳健联系,整体提升专业综合能力水平。 展开更多
关键词 师范认证 “心理学基础” 课堂教学 实践教学
下载PDF
算力网络资源管理安全架构与关键技术 被引量:1
15
作者 高凯辉 李丹 陈力 《信息通信技术》 2023年第3期13-20,共8页
算力网络作为对泛在的计算和网络资源进行灵活调度的新型信息基础设施,对数字经济的发展具有重要意义。算力网络资源管理系统维护算力资源信息并响应用户请求,是支撑算力网络的关键组件,但尚未形成体系化的安全架构,面临着重大安全威胁... 算力网络作为对泛在的计算和网络资源进行灵活调度的新型信息基础设施,对数字经济的发展具有重要意义。算力网络资源管理系统维护算力资源信息并响应用户请求,是支撑算力网络的关键组件,但尚未形成体系化的安全架构,面临着重大安全威胁。文章首先分析当前算力网络资源管理面临的安全风险,并提出算力网络资源管理安全架构,然后梳理其中的关键技术,包括算力资源安全通告协议、高效算力资源校验和算力请求安全解析机制,为算力网络安全体系的建设提供支撑。 展开更多
关键词 算力网络 安全架构 资源安全通告 远程证明 大语言模型
下载PDF
一种基于远程证明的智能制造设备群的主动防御方案
16
作者 孔维一 李昕 +2 位作者 宋永立 况博裕 付安民 《信息安全研究》 CSCD 2023年第6期580-586,共7页
随着人工智能技术的发展,智能制造已成为目前企业生产的必然选择.然而与此同时,智能制造设备群面临的安全风险也不断上升,一个被入侵的智能制造设备不仅会造成机密泄露、生产链错误等问题,还会成为攻击者的跳板进而影响整个设备群的安全... 随着人工智能技术的发展,智能制造已成为目前企业生产的必然选择.然而与此同时,智能制造设备群面临的安全风险也不断上升,一个被入侵的智能制造设备不仅会造成机密泄露、生产链错误等问题,还会成为攻击者的跳板进而影响整个设备群的安全.设计了一种基于远程证明的智能制造系统设备群的主动防御方案SecRA,以验证设备群的安全状态.SecRA对每个智能制造设备都生成独立的证明挑战,实现了网关和设备间点到点通信,保证了该主动防御方法的安全性.SecRA通过对智能制造系统中网关设备的功能扩展,完成验证者和设备之间的异步通信,以匹配现有智能制造系统网络结构.此外,SecRA基于挑战-质询的证明协议,将通信和计算开销都转移到资源丰富的网关设备,极大节省了设备端的开销.最后,仿真实验证明了SecRA主动防御方法的高效性和可行性. 展开更多
关键词 人工智能 智能制造 远程证明 群证明 主动防御
下载PDF
基于区块链的域间路由策略符合性验证方法 被引量:1
17
作者 陈迪 邱菡 +2 位作者 朱俊虎 王清贤 樊松委 《软件学报》 EI CSCD 北大核心 2023年第9期4336-4350,共15页
域间路由系统自治域(ASes)间具有不同的商业关系和路由策略.违反自治域间出站策略协定的路由传播可能引发路由泄露,进而导致网络中断、流量窃听、链路过载等严重后果.路由策略符合性验证对于保证域间路由系统安全性和稳定性至关重要.但... 域间路由系统自治域(ASes)间具有不同的商业关系和路由策略.违反自治域间出站策略协定的路由传播可能引发路由泄露,进而导致网络中断、流量窃听、链路过载等严重后果.路由策略符合性验证对于保证域间路由系统安全性和稳定性至关重要.但自治域对本地路由策略自主配置与隐私保护的双重需求增加了验证路由策略符合性的难度,使其一直是域间路由安全领域尚未妥善解决的难点问题.提出一种基于区块链的域间路由策略符合性验证方法.该方法以区块链和密码学技术作为信任背书,使自治域能够以安全和隐私的方式发布、交互、验证和执行路由策略期望,通过生成对应路由更新的路由证明,保证路由传播过程的真实性,从而以多方协同的方式完成路由策略符合性验证.通过实现原型系统并基于真实路由数据开展实验与分析,结果表明该方法可以在不泄露自治域商业关系和本地路由策略的前提下针对路由传播出站策略符合性进行可追溯的验证,以合理的开销有效抑制策略违规路由传播,在局部部署情况下也具有显著的策略违规路由抑制能力. 展开更多
关键词 域间路由安全 区块链 路由策略符合性 路由认证
下载PDF
基于DICE的证明存储方案
18
作者 王辉 冯伟 秦宇 《计算机系统应用》 2023年第9期53-66,共14页
信息技术的不断发展和智能终端设备的普及导致全球数据存储总量持续增长,数据面临的威胁挑战也随着其重要性的凸显而日益增加,但目前部分计算设备和存储设备仍存在缺乏数据保护模块或数据保护能力较弱的问题.现有数据安全存储技术一般... 信息技术的不断发展和智能终端设备的普及导致全球数据存储总量持续增长,数据面临的威胁挑战也随着其重要性的凸显而日益增加,但目前部分计算设备和存储设备仍存在缺乏数据保护模块或数据保护能力较弱的问题.现有数据安全存储技术一般通过加密的方式实现对数据的保护,但是数据的加解密操作即数据保护过程通常都在应用设备上执行,导致应用设备遭受各类攻击时会对存储数据的安全造成威胁.针对以上问题,本文提出了一种基于DICE的物联网设备证明存储方案,利用基于轻量级信任根DICE构建的可信物联网设备为通用计算设备(统称为主机)提供安全存储服务,将数据的加解密操作移至可信物联网设备上执行,消除因主机遭受内存攻击等风险对存储数据造成的威胁.本文工作主要包括以下3方面:(1)利用信任根DICE构建可信物联网设备,为提供可信服务提供安全前提.(2)建立基于信任根DICE的远程证明机制和访问控制机制实现安全认证和安全通信信道的建立.(3)最终利用可信物联网设备为合法主机用户提供可信的安全存储服务,在实现数据安全存储的同时,兼顾隔离性和使用过程的灵活性.实验结果表明,本方案提供的安全存储服务具有较高的文件传输速率,并具备较高的安全性,可满足通用场景下的数据安全存储需求. 展开更多
关键词 物联网设备 安全存储 轻量级信任根 可信启动 远程证明
下载PDF
PIMS:An Efficient Process Integrity Monitoring System Based on Blockchain and Trusted Computing in Cloud-Native Context
19
作者 Miaomiao Yang Guosheng Huang +3 位作者 Junwei Liu Yanshuang Gui Qixu Wang Xingshu Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第8期1879-1898,共20页
With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,mal... With the advantages of lightweight and high resource utilization,cloud-native technology with containers as the core is gradually becoming themainstreamtechnical architecture for information infrastructure.However,malware attacks such as Doki and Symbiote threaten the container runtime’s security.Malware initiates various types of runtime anomalies based on process form(e.g.,modifying the process of a container,and opening the external ports).Fortunately,dynamic monitoring mechanisms have proven to be a feasible solution for verifying the trusted state of containers at runtime.Nevertheless,the current routine dynamic monitoring mechanisms for baseline data protection are still based on strong security assumptions.As a result,the existing dynamicmonitoringmechanismis still not practical enough.To ensure the trustworthiness of the baseline value data and,simultaneously,to achieve the integrity verification of the monitored process,we combine blockchain and trusted computing to propose a process integrity monitoring system named IPMS.Firstly,the hardware TPM 2.0 module is applied to construct a trusted security foundation for the integrity of the process code segment due to its tamper-proof feature.Then,design a new format for storing measurement logs,easily distinguishing files with the same name in different containers from log information.Meanwhile,the baseline value data is stored on the blockchain to avoidmalicious damage.Finally,trusted computing technology is used to perform fine-grained integrity measurement and remote attestation of processes in a container,detect abnormal containers in time and control them.We have implemented a prototype system and performed extensive simulation experiments to test and analyze the functionality and performance of the PIMS.Experimental results show that PIMS can accurately and efficiently detect tampered processes with only 3.57% performance loss to the container. 展开更多
关键词 Blockchain-based protection dynamic monitoring remote attestation integrity verification
下载PDF
TCG架构下的证明问题研究及进展 被引量:7
20
作者 谭良 刘震 周明天 《电子学报》 EI CAS CSCD 北大核心 2010年第5期1105-1112,共8页
证明问题是可信计算的核心问题之一.TCG架构下的证明问题解决方案由于可扩展性差、不灵活、容易暴露平台隐私以及性能低,正在成为可信计算的应用、推广和普及的瓶颈,严重地阻碍了可信计算在更广的范围内进行延伸和拓展.介绍了证明的基... 证明问题是可信计算的核心问题之一.TCG架构下的证明问题解决方案由于可扩展性差、不灵活、容易暴露平台隐私以及性能低,正在成为可信计算的应用、推广和普及的瓶颈,严重地阻碍了可信计算在更广的范围内进行延伸和拓展.介绍了证明的基本概念并给出形式化定义,详细阐述了三元和四元证明系统的基本架构及工作机制,并指出平台身份证明采用了"推"式四元证明系统,而平台配置证明仍然采用三元证明系统.分析了当前对TCG架构下的平台身份证明、平台环境状态配置信息证明以及平台动态环境状态(运行时环境状态)证明等三个方面开展的研究工作,并对这些工作进行了总结.结合已有的研究成果,探讨了TCG架构下的证明问题的研究方向及其面临的挑战. 展开更多
关键词 可信计算 证明 平台身份证明 平台配置证明 平台运行时环境证明
下载PDF
上一页 1 2 31 下一页 到第
使用帮助 返回顶部