Trusted Isolation Environment: An Attestation Architecture with Usage Control Model

被引:0
|
作者
Ruan, Anbang [1 ,2 ]
Shen, Qingni [1 ,2 ]
Gu, Liang [2 ,3 ]
Wang, Li [1 ,2 ]
Shi, Lei [2 ,3 ]
Yang, Yahui [1 ,2 ]
Chen, Zhong [1 ,2 ,3 ]
机构
[1] Peking Univ, Sch Software & Microelect, Beijing 100871, Peoples R China
[2] Peking Univ, Key Lab High Confidence Software Technol, Beijing, Peoples R China
[3] Peking Univ, Sch EECS, Inst Software, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Remote attestation; trusted computing; usage control; MAC model; isolation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Trusted Computing Group (TCG) proposed remote attestation as a solution for establishing trust among distributed applications However. current TCG attestation architecture requires challengers to attest to every program loaded on the target platform, which will increase the attestation overhead and bring privacy leakage and other security risks In this paper, we define a conceptual model called the Trusted Isolation Environment (TIE) to facilitate remote attestation We then present the implementation of TIE with our tailored Usage CONtrol model (UCONRA) and a set of system-defined policies With its continuous and mutable feature and obligation support, we construct the TIE with flexibility Lastly, we propose our attestation architecture with UCONRA gaining the benefits of scalable and lightweight
引用
收藏
页码:226 / +
页数:3
相关论文
共 50 条
  • [21] A Delegation Authorization Security Protocol Based on Remote Attestation for Multimedia Usage Control
    Wang, Yulei
    Yang, Jie
    Feng, Weining
    [J]. RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2015, 8 (01) : 18 - 25
  • [22] A Trusted Role-Based Access Control Model for Dynamic Collaboration in a Federated Environment
    Lianzhong, Liu
    Peng, Liu
    [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 181 - 186
  • [23] System security model based on trusted access control under cloud computing environment
    Wang F.
    [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [24] Elevating Security in Migration: An Enhanced Trusted Execution Environment-Based Generic Virtual Remote Attestation Scheme
    Yuan, Jie
    Shen, Yinghua
    Xu, Rui
    Wei, Xinghai
    Liu, Dongxiao
    [J]. INFORMATION, 2024, 15 (08)
  • [25] Usage control reference monitor architecture
    Schaefer, Christian
    [J]. Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Proceedings, 2007, : 13 - 18
  • [26] Study on the Architecture and Management Platform Model of Trusted Network
    Peng, Xi
    Wu, Zheng
    Yu, Yang
    Zhang, Xia
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING WORKSHOP PROCEEDINGS, VOLS 1 AND 2, 2008, : 514 - +
  • [27] Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling
    Trong-Thuc Hoang
    Duran, Ckristian
    Serrano, Ronaldo
    Sarmiento, Marco
    Khai-Duy Nguyen
    Tsukamoto, Akira
    Suzaki, Kuniyasu
    Cong-Kha Pham
    [J]. IEEE ACCESS, 2022, 10 : 46014 - 46027
  • [28] An Architecture for Virtualization-Based Trusted Execution Environment on Mobile Devices
    Jung, Young-Woo
    Kim, Hag-Young
    Kim, Sang-Wook
    [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 540 - 547
  • [29] A trusted decentralized access control framework for the client/server architecture
    Han, Weili
    Xu, Min
    Zhao, Weidong
    Li, Guofu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (02) : 76 - 83
  • [30] Retaining Control Over Private Virtual Machines Hosted by a Cloud Provider Using Mandatory Access Control, Trusted Boot and Attestation
    Simma, Armin
    Rusch, Philipp
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2014), 2014, : 172 - 180