Agent Trusted Authentication Model Based on Star-style and TPM

被引:0
|
作者
Fan, Chao [1 ]
Zhao, Rong-Cai [1 ]
Shan, Zheng [1 ]
Zhao, Bing-Lin [1 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
关键词
Trusted computing; Trust Chain; Agent; Trusted Authentication; MULTIAGENT SYSTEMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In view of the poor security, robustness, high maintenance management cost and other problems in the trusted model of Agent, an agent trusted authentication model based on star-type and TPM is put forward. The model integrates Root of Trust for Measurement (RTM), Root of Trust for Storage (RTS), Root of Trust for Reporting (RTR) and data backup module into the TPM by extending the TPM, the extended TPM as the Roots of Trust is as the rusted measurement and controller of Agent, and a star-type trust transfer structure with data recovery function is used to achieve trusted authentication of Agent. The model can effectively improve the security and robustness of the system and reduce the cost of maintenance and management through comparisons and analysis.
引用
收藏
页码:215 / 225
页数:11
相关论文
共 50 条
  • [1] A Star-Style Trust Model with the Ability of Data Recovery for Trusted Computing Platform
    CHEN Lu
    ZHANG Huanguo
    ZHOU Qing
    ZHANG Liqiang
    [J]. Wuhan University Journal of Natural Sciences, 2016, 21 (02) : 115 - 120
  • [2] Trusted Firmware Services Based on TPM
    Du, Zhenlong
    Li, Xiaoli
    Shen, Kangkang
    [J]. TRUSTED SYSTEMS, 2010, 6163 : 227 - +
  • [3] A New Trusted Application Platform Architecture based on TPM
    Zhou Yan-Wei
    Wu Zhen-Qiang
    [J]. 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 73 - 77
  • [4] Trusted Software Behavior Monitoring Model Based on Agent
    Li, Caimao
    Chen, Shaofan
    Wu, Hanwei
    Chen, Jing
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 420 - 423
  • [5] Hierarchical and Dynamic Trusted Evaluation Model Based on Agent
    Yang Xiaohui
    Zhou Xuehai
    Tian Junfeng
    [J]. PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 312 - +
  • [6] The Authentication and Identity Delegation about Mobile Agent System based on Trusted Computing Platform
    Shen, Zhidong
    Wu, Xiaoping
    [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2010, : 672 - 676
  • [7] Research and application of trusted computing platform based on portable TPM
    Fang, Weiwei
    Zhou, Changsheng
    Zhang, Ying
    Zhang, Liang
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 506 - 509
  • [8] A Novel Trusted Boot Model for Embedded Smart Device without TPM
    Wang, Rui
    Yan, Yonghang
    [J]. 2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 228 - +
  • [9] TPM-Based Authentication Mechanism for Apache Hadoop
    Khalil, Issa
    Dou, Zuochao
    Khreishah, Abdallah
    [J]. INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 105 - 122
  • [10] A new information measurement scheme based on TPM for trusted network access
    Chen, Lu
    Zhang, Huanguo
    Zhang, Liqiang
    Cai, Liang
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 506 - +