Dynamic Remote Attestation on CP-ABE Algorithm

Article Preview

Abstract:

Current remote attestation schemes in trusted cloud computing lack of dynamic measure scheme of virtual computing nodes. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of virtual computing node running state, and a remote attestation scheme based on the trust measure results and CP-ABE attribute access control. By RO security analysis, and a simulation, we verify the security and efficiency of the program. The trust measure of platform running state is mainly based on the trust rating of the programs running on the platform, and a total trust value of the platform by an algorithm. The trust measure of virtual computing node running state is mainly based on the trust measure of the programs running on the platform and CP-ABE attribute access control. The remote attestation for the trust measure of platform running state is based on CDH problem. In this paper, we carry out simulation experiment with different proportions of non-credible nodes and the experiment results verify the trust evaluation efficiency of the scheme on the virtual machine.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

259-265

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Cachin C, Keidar I, Shraer A. Trusting the cloud[J]. ACM SIGACT News, 2009, 40 (2): 81-86.

DOI: 10.1145/1556154.1556173

Google Scholar

[2] Goyal V, Pandey O, Sahai A, et al. Attribute basedencryptionfor fine-grained access control of encrypted data [DB /OL]. [2012-01-09]. http: / /dl. acm. org/ci-tation. cfm?id = 1180418.

DOI: 10.1145/1180405.1180418

Google Scholar

[3] Bethencourt J, Sahai A, Waters B. Ciphertext-policyattribute-based encryption[DB /OL]. [2012-02-11]. http: / /ieeexplore. ieee. org/xpls/abs_all. jsp?ar-number = 4223236.

Google Scholar

[4] Flood Cheng, Zhang Min, FENG Deng. AB-ACCS: A cloud storage ciphertext accessControl method [J]. Computer Research and Development, 2010, 47: 259-265. Hong Cheng, Zhang Min Feng Dengguo. AB-ACCS: Acryptographic access control scheme for cloud storage[J]. Journal of Computer Research and Development, 2010, 47: 259-265(Ch).

Google Scholar

[5] SunState Azusa, Dong Yu, Li Yun. Based onCP-ABEAlgorithms cloud storage dataAccess Control [J]. Journal of Communication, 2011, 32 (7): 147-152. Sun Guozi, Dong Yu, Li Yun. CP-ABE based data ac-cess control for cloud storage[J]. Journal on Commu-nications, 2011, 32 (7): 147-152(Ch).

Google Scholar

[6] WANG Jiangshao,YU Zong,LI Guang. Study of Trusted Chain Technology of Computing Trusted [J] . Computer Engineering and Design,2008,29 ( 9) : 2195-2198.

Google Scholar

[7] Dries Schellekens,Brecht Wyseur,Bart Preneel. Remote attestation on legacy operating systems with trusted platform modules [J] .Electronic Notes in Theoretical Computer Science,2008,197 ( 1) : 59-72.

DOI: 10.1016/j.entcs.2007.10.014

Google Scholar

[8] Martin Pirker,Ronald Toegl,Daniel Hein and Peter Danner. A privacy for anonymity and trust [G] . LNCS 5471: Trusted Computing,2009: 101-119.

DOI: 10.1007/978-3-642-00587-9_7

Google Scholar

[9] CHEN L Q,LANDFERMANN R,LOHR H,et al. A protocol for property-based attestation [C] / / Proceedings of the first ACM work-shop on Scalable Trusted Computing. New York: ACM Press,2006: 7-16.

DOI: 10.1145/1179474.1179479

Google Scholar

[10] LI Shang-jie,HE Ye-ping. On privacy of property based remote attestation [J] . Journal on Communication,2009,30 ( 11 ) : 146-152.

Google Scholar

[11] Chen L Q,Landfermann R,L hr H,et al. A protocol for property-based attestation[A] . In: roc. of the 1st ACM Workshop on Scalable Trusted Computing[C]. Nova Scotia: ACM Press,2006: 7 - 16.

DOI: 10.1145/1179474.1179479

Google Scholar

[12] Chang E, Thomson P, Dillon T, Hussain F. The fuzzy and dynamic nature of trust[J]. LNCS 3592. Berlin: Springer-Verlag, 2005. 161-174.

Google Scholar

[13] Bei Gong, Trusted Network Architecture Supporting Trusted Group Establishment and Key Technologies Research[D], Beijing University of Technology,(2012).

Google Scholar