Affiliation:
1. China Electric Power Research Institute
Abstract
Remote attestation is the key technology of trusted computing. The existing remote attestation techniques lack of the trust measure of platform running state. In this paper, by the analysis and comparison of existing remote attestation technology, we propose a trust measure of platform running state, and a remote attestation program based on the trust measure results. By RO security analysis, and a simulation, we verify the security and efficiency of the program. The trust measure of platform running state is mainly based on the trust rating of the programs running on the platform, and a total trust value of the platform by an algorithm. The remote attestation for the trust measure of platform running state is based on K-CCA problem. In this paper, we carry out simulation experiment with different proportions of non-credible nodes and the experiment results verify the trust evaluation efficiency of the scheme on the platform.
Publisher
Trans Tech Publications, Ltd.
Reference12 articles.
1. WANG Jiangshao, Yu Zong, LI Guang. Study of trusted chain technology of computing trusted [J] . Computer Engineering & Design, 2008, 29 ( 9 ) : 2195-2198.
2. Dries Schellekens, Brecht Wyseur, Bart Preneel. Remote attestation on legacy operating systems with trusted platform modules [J] . Electronic Notes in Theoretical Computer Science, 2008, 197 ( 1) : 59-72.
3. Martin Pirker, Ronald Toegl, Daniel Hein and Peter Danner. A privacy for anonymity and trust [G] . LNCS 5471: Trusted Computing, 2009: 101-119.
4. CHEN L Q, LANDFERMANN R, LOHR H, et al. A protocol for property-based attestation [C] / / Proceedings of the first ACM work-shop on Scalable Trusted Computing. New York: ACM Press, 2006: 7-16.
5. LI Shang-jie, HE Ye-ping. On privacy of property based remote attestation [J] . Journal on Communication, 2009, 30 ( 11 ) : 146-152.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献