Dynamic Remote Attestation on Trusted Computing

Article Preview

Abstract:

Remote attestation is the key technology of trusted computing. The existing remote attestation techniques lack of the trust measure of platform running state. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of platform running state, and a remote attestation program based on the trust measure results. By RO security analysis, and a simulation, we verify the security and efficiency of the program. The trust measure of platform running state is mainly based on the trust rating of the programs running on the platform, and a total trust value of the platform by an algorithm. The remote attestation for the trust measure of platform running state is based on K-CCA problem. In this paper, we carry out simulation experiment with different proportions of non-credible nodes and the experiment results verify the trust evaluation efficiency of the scheme on the platform.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

167-172

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] WANG Jiangshao, Yu Zong, LI Guang. Study of trusted chain technology of computing trusted [J] . Computer Engineering & Design, 2008, 29 ( 9 ) : 2195-2198.

Google Scholar

[2] Dries Schellekens, Brecht Wyseur, Bart Preneel. Remote attestation on legacy operating systems with trusted platform modules [J] . Electronic Notes in Theoretical Computer Science, 2008, 197 ( 1) : 59-72.

DOI: 10.1016/j.entcs.2007.10.014

Google Scholar

[3] Martin Pirker, Ronald Toegl, Daniel Hein and Peter Danner. A privacy for anonymity and trust [G] . LNCS 5471: Trusted Computing, 2009: 101-119.

DOI: 10.1007/978-3-642-00587-9_7

Google Scholar

[4] CHEN L Q, LANDFERMANN R, LOHR H, et al. A protocol for property-based attestation [C] / / Proceedings of the first ACM work-shop on Scalable Trusted Computing. New York: ACM Press, 2006: 7-16.

DOI: 10.1145/1179474.1179479

Google Scholar

[5] LI Shang-jie, HE Ye-ping. On privacy of property based remote attestation [J] . Journal on Communication, 2009, 30 ( 11 ) : 146-152.

Google Scholar

[6] Chen L Q, Landfermann R, Lhr H, et al. A protocol for property-based attestation[A] . In: roc. of the 1st ACM Workshop on Scalable Trusted Computing[C] . Nova Scotia: ACM Press, 2006: 7 - 16.

DOI: 10.1145/1179474.1179479

Google Scholar

[7] Holt J, Bradshaw R, Seamons K, Orman H. Hidden credentials[C]/Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society. Washington DC, 2008: 1-8.

DOI: 10.1145/1005140.1005142

Google Scholar

[8] Bradshaw R, Holt J, Seamons K. Concealing complex policies with hidden credentials[C] /Proceedings of the 11th ACM Conference on Computer and Communications Security. Washington, DC, USA, 2004: 146-157.

DOI: 10.1145/1030083.1030104

Google Scholar

[9] Winsborough W H, Li N. Protecting sensitive attributes inautomated trust negotiation/Proceedings of the ACM Work-shop on Privacy in the Electronic Society. Washington, DC, USA, 2002: 41-51.

DOI: 10.1145/644527.644532

Google Scholar

[10] HU Jia-fu, Li Lixin, Zhou, Yanzhou, et, al. Dynamic remote attestation framework based on the strategy and virtual machine technology [J]. Wuhan University (Natural Science Edition) 1671-8836(2009)01-0045-04.

Google Scholar

[11] Chang E, Thomson P, Dillon T, Hussain F. The Fuzzy and Dynamic Nature of Trust[J]. LNCS 3592. Berlin: Springer-Verlag, 2005. 161-174.

Google Scholar

[12] Bei Gong, Trusted Network Architecture Supporting Trusted Group Establishment and Key Technologies Research[D], Beijing University of Technology, (2012).

Google Scholar