A management approach to key-used times based on trusted platform module in cloud storage

被引:0
|
作者
机构
[1] [1,Wang, Lina
[2] Ren, Zhengwei
[3] Dong, Yongfeng
[4] 1,Yu, Rongwei
[5] Deng, Ruyi
来源
Ren, Z. (zhengwei_ren@163.com) | 1628年 / Science Press卷 / 50期
关键词
Cloud storage - Authentication - Information management - Storage management - Trusted computing - Electronic document identification systems;
D O I
暂无
中图分类号
学科分类号
摘要
A management approach to key used times based on trusted platform module (TPM) is proposed to protect the confidentiality of data in cloud storage and control the key-used times. Firstly, the data is encrypted by a symmetric encryption scheme using a data encryption key (DEK). And then DEK is encrypted by the ciphertext-policy attribute-based encryption (CP-ABE) scheme to control the access of DEK. Only those whose attributes satisfy the access control tree adopted by CP-ABE can decrypt and access DEK. Then DEK will be stored securely by binding the key and the TPM with a digital signature locally. The physical monotonic counter of the TPM is utilized to generate virtual monotonic counter (VMC) for each DEK. Secondly, comparing the monotonically increased value of VMC and the pre-set times that DEK can be used, DEK is judged to be deleted or to be used unceasingly so that the used times of DEK is controlled. Finally, the replay attack of the hard disk is prevented by the anti-physical tampering functionality of TPM, monotonicity of the counter, and digital signature. The experiment results show that the performance cost is low and the proposed scheme can securely store and effectively protect DEK, thus achieving the goal that the times of DEK can be used is limited.
引用
收藏
相关论文
共 50 条
  • [1] Research of key management based on trusted module for cloud storage user
    Zhao, Bo
    Li, Yifan
    Milan, Heinayati
    Fei, Yongkang
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 25 - 31
  • [2] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
  • [3] Blockchain based secret key management for trusted platform module standard in reconfigurable platform
    Paul, Rourab
    Ghosh, Nimisha
    Panigrahi, Amrutanshu
    Chakrabarti, Amlan
    Mohapatra, Prasant
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (22):
  • [4] A Method of Data Storage and Management of Embedded Trusted Platform Module
    Liu, Gang
    Zhang, Xun
    Zhang, Yuan
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER AND COMMUNICATION ENGINEERING, 2014, 111 : 43 - 46
  • [5] On trusted computer platform key management
    Xu Yi
    Fan Huimin
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 579 - 583
  • [6] Firmware of trusted channel based on the trusted platform control module
    Mao Junjie
    Zhang Chongbin
    Zhang Baofeng
    Guo Ying
    Wu Yushu
    Xie Shihua
    Zhang Xiaofei
    Zhao Shuang
    2013 6TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKS AND INTELLIGENT SYSTEMS (ICINIS), 2013, : 189 - 192
  • [7] A Trusted Architecture for Virtual Machines on Cloud Servers with Trusted Platform Module and Certificate Authority
    Zhilou Yu
    Weipin Zhang
    Hongjun Dai
    Journal of Signal Processing Systems, 2017, 86 : 327 - 336
  • [8] A Trusted Architecture for Virtual Machines on Cloud Servers with Trusted Platform Module and Certificate Authority
    Yu, Zhilou
    Zhang, Weipin
    Dai, Hongjun
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 86 (2-3): : 327 - 336
  • [9] Trusted cloud platform oriented to knowledge management
    Dai, J. (zhanglifendaijun2013@gmail.com), 1600, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
  • [10] Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective
    Jha, Devki Nandan
    Lenton, Graham
    Asker, James
    Blundell, David
    Wallom, David
    IT PROFESSIONAL, 2022, 24 (03) : 81 - 87