Key management in trusted disk based on TPCM

被引:0
|
作者
Wang, Guan [1 ]
Wang, Bo [1 ]
Ruan, Fu-Sheng [1 ]
Liu, Zhi-Jun [1 ]
机构
[1] College of Computer Science, Beijing University of Technology, Beijing 100124, China
关键词
Trusted computing - Digital storage;
D O I
暂无
中图分类号
学科分类号
摘要
In TCG trusted storage specification, weak identification verification of password authentication and the lack of key protection mechanism are two problems. In this paper, the authors put forward a key management model of hard disk based on TPCM. Based on the model, the schemes of bidirectional authentication and authorization data protection are proposed to address the problems of identity authenticity and key confidentiality. And the credibility and safety of key management of trusted disk have been improved.
引用
收藏
页码:35 / 39
相关论文
共 50 条
  • [1] On Design of a Trusted Software Base with Support of TPCM
    Shi, Wenchang
    TRUSTED SYSTEMS, 2010, 6163 : 1 - 15
  • [2] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
  • [3] On trusted computer platform key management
    Xu Yi
    Fan Huimin
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 579 - 583
  • [4] Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp
    Zhai, Guang-hui
    Li, Juan
    Song, Cheng
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 1, 2012, 288 : 327 - +
  • [5] Trusted Third Party Based Key Management for enhancing LoRaWAN Security
    Naoui, Sarra
    Elhdhili, Mohamed Elhoucine
    Saidane, Leila Azouz
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1306 - 1313
  • [6] Research of key management based on trusted module for cloud storage user
    Zhao, Bo
    Li, Yifan
    Milan, Heinayati
    Fei, Yongkang
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 25 - 31
  • [7] A trusted key management scheme for digital rights management
    Jeong, Y
    Yoon, K
    Ryou, J
    ETRI JOURNAL, 2005, 27 (01) : 114 - 117
  • [8] A Key Management Scheme for Establishing an Encryption-based Trusted IoT System
    Mamun, Quazi
    Rana, Muhammad
    2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 41 - 46
  • [9] Key management in a non-trusted distributed environment
    Dawson, E
    Clark, A
    Looi, M
    FUTURE GENERATION COMPUTER SYSTEMS, 2000, 16 (04) : 319 - 329
  • [10] Key management for access control in trusted cloud storages
    Song, W. (songwei@whu.edu.cn), 1613, Science Press (50):