A management approach to key-used times based on trusted platform module in cloud storage

被引:0
|
作者
机构
[1] [1,Wang, Lina
[2] Ren, Zhengwei
[3] Dong, Yongfeng
[4] 1,Yu, Rongwei
[5] Deng, Ruyi
来源
Ren, Z. (zhengwei_ren@163.com) | 1628年 / Science Press卷 / 50期
关键词
Cloud storage - Authentication - Information management - Storage management - Trusted computing - Electronic document identification systems;
D O I
暂无
中图分类号
学科分类号
摘要
A management approach to key used times based on trusted platform module (TPM) is proposed to protect the confidentiality of data in cloud storage and control the key-used times. Firstly, the data is encrypted by a symmetric encryption scheme using a data encryption key (DEK). And then DEK is encrypted by the ciphertext-policy attribute-based encryption (CP-ABE) scheme to control the access of DEK. Only those whose attributes satisfy the access control tree adopted by CP-ABE can decrypt and access DEK. Then DEK will be stored securely by binding the key and the TPM with a digital signature locally. The physical monotonic counter of the TPM is utilized to generate virtual monotonic counter (VMC) for each DEK. Secondly, comparing the monotonically increased value of VMC and the pre-set times that DEK can be used, DEK is judged to be deleted or to be used unceasingly so that the used times of DEK is controlled. Finally, the replay attack of the hard disk is prevented by the anti-physical tampering functionality of TPM, monotonicity of the counter, and digital signature. The experiment results show that the performance cost is low and the proposed scheme can securely store and effectively protect DEK, thus achieving the goal that the times of DEK can be used is limited.
引用
收藏
相关论文
共 50 条
  • [31] A trusted evidence collection method based on the trusted third-party for cloud platform
    Wu L.
    Zhan J.
    Zhao Y.
    Hu J.
    Li M.
    Int. J. Simul. Syst. Sci. Technol., 25
  • [32] Key management in trusted disk based on TPCM
    Wang, Guan
    Wang, Bo
    Ruan, Fu-Sheng
    Liu, Zhi-Jun
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 35 - 39
  • [33] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [34] A Design of the Trusted Platform Module Based on Multi-Core Processor
    Wang Yubo
    Mao Junjie
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 538 - 541
  • [35] RAVS: Remote attestation of video security based on trusted platform module
    Ma, Q. (maqiang_my@163.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (09):
  • [36] A Method based on Platform Integrity Verification for Activating A Mobile Trusted Module
    Kim, Daewon
    Jeon, Yongsung
    Kim, Jeongnyeo
    2015 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC), 2015, : 1174 - 1176
  • [37] Research of Key Management Technology on Cloud Storage
    Song, Ningning
    Wei, Zhiwei
    Xhou, Xianwei
    Liu, Qian
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2013, 9 (06) : 58 - 61
  • [38] Versatile Key Management for Secure Cloud Storage
    Graf, Sebastian
    Lang, Patrick
    Hohenadel, Stefan A.
    Waldvogel, Marcel
    2012 31ST INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS 2012), 2012, : 469 - 474
  • [39] Scalable Key Management for Distributed Cloud Storage
    Bjoerkqvist, Mathias
    Cachin, Christian
    Engelmann, Felix
    Sorniotti, Alessandro
    2018 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2018), 2018, : 250 - 256
  • [40] Portable Key Management Service for Cloud Storage
    Jang-Jaccard, Julian
    Manraj, Avnish
    Nepal, Surya
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 147 - 156