A management approach to key-used times based on trusted platform module in cloud storage

被引:0
|
作者
机构
[1] [1,Wang, Lina
[2] Ren, Zhengwei
[3] Dong, Yongfeng
[4] 1,Yu, Rongwei
[5] Deng, Ruyi
来源
Ren, Z. (zhengwei_ren@163.com) | 1628年 / Science Press卷 / 50期
关键词
Cloud storage - Authentication - Information management - Storage management - Trusted computing - Electronic document identification systems;
D O I
暂无
中图分类号
学科分类号
摘要
A management approach to key used times based on trusted platform module (TPM) is proposed to protect the confidentiality of data in cloud storage and control the key-used times. Firstly, the data is encrypted by a symmetric encryption scheme using a data encryption key (DEK). And then DEK is encrypted by the ciphertext-policy attribute-based encryption (CP-ABE) scheme to control the access of DEK. Only those whose attributes satisfy the access control tree adopted by CP-ABE can decrypt and access DEK. Then DEK will be stored securely by binding the key and the TPM with a digital signature locally. The physical monotonic counter of the TPM is utilized to generate virtual monotonic counter (VMC) for each DEK. Secondly, comparing the monotonically increased value of VMC and the pre-set times that DEK can be used, DEK is judged to be deleted or to be used unceasingly so that the used times of DEK is controlled. Finally, the replay attack of the hard disk is prevented by the anti-physical tampering functionality of TPM, monotonicity of the counter, and digital signature. The experiment results show that the performance cost is low and the proposed scheme can securely store and effectively protect DEK, thus achieving the goal that the times of DEK can be used is limited.
引用
收藏
相关论文
共 50 条
  • [21] FPGA-based trusted platform module attack
    Jiang, W. (j8w8@sohu.com), 1600, Beijing University of Technology (39):
  • [22] Implementation of ECC-based trusted platform module
    Zhang, Xing
    Zhou, Ming
    Zhijang, Jun-Xi
    Li, Man
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2168 - 2173
  • [23] A software-based Trusted Platform Module emulator
    Strasser, Mario
    Stamer, Heiko
    TRUSTED COMPUTING - CHALLENGES AND APPLICATIONS, PROCEEDINGS, 2008, 4968 : 33 - +
  • [24] Active measures based on a trusted platform control module
    Guo, Ying
    Mao, Junjie
    Zhang, Chongbin
    Zhang, Baofeng
    Lin, Li
    Xie, Shihua
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2012, 52 (10): : 1465 - 1473
  • [25] A Key to Embedded System Security: Locking and Unlocking Secrets with a Trusted Platform Module
    Lenard, Teri
    Collen, Anastasija
    Nijdam, Niels A.
    Genge, Bela
    2023 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW, 2023, : 329 - 335
  • [26] An approach to ensure the trustworthiness of cloud platform using the trusted chain
    Wang, Guan
    Gao, Lubaihui
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 192 - 194
  • [27] Encryption key management as a trusted security as a service for cloud computing
    Fehis, Saad
    Nouali, Omar
    Kechadi, Mohand-Tahar
    International Journal of Security and Networks, 2021, 16 (03) : 150 - 162
  • [28] A Trusted Platform Module Based Anti-Forensics System
    Goh, Weihan
    Leong, Peng Chor
    Yeo, Chai Kiat
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 46 - 50
  • [29] Research on Storage Security Based on Trusted Computing Platform
    He, Jian
    Xu, Mingdi
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 448 - +
  • [30] Cryptographic Key Distribution Protocol with Trusted Platform Module for Securing In-vehicle Communications
    Genge, Bela
    Haller, Piroska
    15TH INTERNATIONAL CONFERENCE INTERDISCIPLINARITY IN ENGINEERING, 2022, 386 : 796 - 807