Trusted Isolation Environment: An Attestation Architecture with Usage Control Model

被引:0
|
作者
Ruan, Anbang [1 ,2 ]
Shen, Qingni [1 ,2 ]
Gu, Liang [2 ,3 ]
Wang, Li [1 ,2 ]
Shi, Lei [2 ,3 ]
Yang, Yahui [1 ,2 ]
Chen, Zhong [1 ,2 ,3 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Key Lab High Confidence Software Technol, Beijing, Peoples R China
[3] Peking Univ, Sch EECS, Inst Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Remote attestation; trusted computing; usage control; MAC model; isolation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications However. current TCG attestation architecture requires challengers to attest to every program loaded on the target platform, which will increase the attestation overhead and bring privacy leakage and other security risks In this paper, we define a conceptual model called the Trusted Isolation Environment (TIE) to facilitate remote attestation We then present the implementation of TIE with our tailored Usage CONtrol model (UCONRA) and a set of system-defined policies With its continuous and mutable feature and obligation support, we construct the TIE with flexibility Lastly, we propose our attestation architecture with UCONRA gaining the benefits of scalable and lightweight
引用
收藏
页码:226 / +
页数:3
相关论文
共 50 条
  • [1] Trusted Attestation Architecture on an Infrastructure-as-a-Service
    Jin, Xin
    Chen, Xingshu
    Zhao, Cheng
    Zhao, Dandan
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2017, 22 (05) : 469 - 477
  • [2] Trusted Attestation Architecture on an Infrastructure-as-a-Service
    Xin Jin
    Xingshu Chen
    Cheng Zhao
    Dandan Zhao
    [J]. Tsinghua Science and Technology, 2017, 22 (05) : 469 - 477
  • [3] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [4] Remote attestation project of the running environment of the trusted terminal
    Tan, Liang
    Chen, Ju
    [J]. Tan, L. (jkxy_tl@sicnu.edu.cn), 1600, Chinese Academy of Sciences (25): : 1273 - 1290
  • [5] Hardware-Based Trusted Computing Architectures for Isolation and Attestation
    Maene, Pieter
    Gotzfried, Johannes
    de Clercq, Ruan
    Mueller, Tilo
    Freiling, Felix
    Verbauwhede, Ingrid
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 361 - 374
  • [6] WATZ: A Trusted WebAssembly Runtime Environment with Remote Attestation for TrustZone
    Menetrey, James
    Pasin, Marcelo
    Felber, Pascal
    Schiavoni, Valerio
    [J]. 2022 IEEE 42ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2022), 2022, : 1177 - 1189
  • [7] Dynamic Resource Monitoring of SaaS with Attestation for a Trusted Cloud Environment
    Shanmugam, Udhayakumar
    Tamilselvan, Latha
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (04): : 41 - 50
  • [8] A conceptual architecture of a trusted mobile environment
    Yan, Zheng
    [J]. SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 75 - 81
  • [9] Using Asynchronous Collaborative Attestation to Build A Trusted Computing Environment for Mobile Applications
    Zhou, Lei
    Zhang, Fengwei
    Wang, Guojun
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [10] Remote Attestation-Based Access Control on Trusted Computing Platform
    LIU Xian’gang
    [J]. Wuhan University Journal of Natural Sciences, 2010, 15 (03) : 190 - 194