A Trusted Remote Attestation Model based on Trusted Computing

被引:6
|
作者
Yu, Yue [1 ]
Wang, Huaimin [1 ]
Liu, Bo [1 ]
Yin, Gang [1 ]
机构
[1] Natl Univ Def Technol, Natl Lab Parallel & Distributed Proc, Changsha, Hunan, Peoples R China
关键词
remote attestation; secure channel; integrity report; trusted computing;
D O I
10.1109/TrustCom.2013.183
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional security protocols can not be trusted in some application scenarios of high security level because the endpoints integrity is ignored. In this paper, we propose a novel trusted remote attestation model which combines the secure channel and the integrity measurement architecture of trusted computing. We design and implement a prototype system based on a mature security protocol, Transport Layer Security (TLS) protocol, integrated with integrity report provided by trusted platform module (TPM). The TLS protocol guarantees the security of data exchange process and the integrity report of TPM provides the evidence about the trustworthiness and the security state of the communication endpoints. Compared by traditional approaches, our method is more efficient and can be deployed in large scale systems easily.
引用
收藏
页码:1504 / 1509
页数:6
相关论文
共 50 条
  • [1] Analysis and Research of Remote Attestation Based on Trusted Computing
    Guo, Jiaming
    Wei, Jiang
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 192 - 195
  • [2] AN ANONYMOUS REMOTE ATTESTATION FOR TRUSTED CLOUD COMPUTING
    Zhang, Yong
    Li, Xiangxue
    Qian, Haifeng
    [J]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 426 - 429
  • [3] An Effective Approach for Remote Attestation in Trusted Computing
    Huang, Xin
    Peng, Yuxing
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON WEB INFORMATION SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2009, : 80 - +
  • [4] Threshold remote attestation on trusted cloud computing
    Zhao, Yong
    Xue, Fei
    Zhang, Yanxue
    [J]. Journal of Applied Sciences, 2013, 13 (09) : 1592 - 1596
  • [5] A remote anonymous attestation protocol in trusted computing
    Liu, Jiqiang
    Zhao, Jia
    Han, Zhen
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-8, 2008, : 3688 - 3693
  • [6] Remote Attestation-Based Access Control on Trusted Computing Platform
    LIU Xian’gang
    [J]. Wuhan University Journal of Natural Sciences, 2010, 15 (03) : 190 - 194
  • [7] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
    Yu Fajiang
    Chen Jing
    Xiang Yang
    Zhu Jiacheng
    Zhao Yangdi
    [J]. ELECTRONIC COMMERCE RESEARCH, 2019, 19 (03) : 689 - 718
  • [8] An efficient anonymous remote attestation scheme for trusted computing based on improved CPK
    Yu Fajiang
    Chen Jing
    Xiang Yang
    Zhu Jiacheng
    Zhao Yangdi
    [J]. Electronic Commerce Research, 2019, 19 : 689 - 718
  • [9] Trusted State-Space based Remote Attestation
    He, Rongyu
    Qin, Zheng
    [J]. 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL IV, 2010, : 452 - 456
  • [10] Property Based Attestation and Trusted Computing: Analysis and Challenges
    Nagarajan, Aarthi
    Varadharajan, Vijay
    Hitchens, Michael
    Gallery, Eimear
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 278 - +