期刊文献+

基于Merkle散列树的可信云计算信息安全证明方法 被引量:3

Trusted Cloud Computing Information Security Certificate Method Based on Merkle Hash Tree
下载PDF
导出
摘要 可信云计算领域的安全证明是一个综合完整性校验的身份识别的过程,同时向验证者提供了一份云平台可信平台状态报告。将可信计算标准中的安全证明技术引入到现场控制环境中,能够有效地提高设备状态报告的安全性和可信性。本文设计的基于Merkle散列树的安全证明方案及其设计模块可以确保设备主动、周期性地向管理中心发送自己的平台运行状态,存储容量开销和计算成本所需减少,从而减轻了管理中心的计算压力。同时,在完整性报告上绑定时间戳以确保认证的新鲜性,提高了应答方证明的主动性,同时又保证了证明信息的完整性。实验证明提出的安全证明方法减少了证明双方交互的轮数,提高了证明效率。综上所述,基于Merkle散列树的安全证明方法可以确保云计算认证和安全证明的完整性。 Security certification in the field of trusted cloud computing is a comprehensive integrity checking iden- tification process, at the same time, the verifier provides a credible platform status report. The remote attestation of trusted computing standard technology is introduced into the field control environment, and it can effectively improve the safety and credibility of the equipment status. This paper design the security certification scheme based on Merkle hash tree and its design module can ensure equipment sending its platform running state to the management center actively and periodically, and reduce the cost overhead storage capacity and computing requirement, so as to reduce the calculation pressure of management center. At the same time, the timestamp is bound in the integrity report to ensure freshness of authentication and improve the initiative of the responding to prove, and ensures that the integrity of the information proving at the same time. Experiments prove that this security certificate protocol reduces the interaction between the two sides round number and improve the efficiency of the proof. All in all, trusted cloud computing information security of certificate method based on Merkle tree can ensure the integrity of cloud computing certification and safety certification.
作者 谢飞
出处 《激光杂志》 北大核心 2016年第11期122-127,共6页 Laser Journal
基金 江苏省高等职业院校国内高级访问学者计划资助项目(2013fx096)
关键词 云计算 Merkle散列树 可信计算 安全证明 cloud computing merkle hash tree trusted computing optimal solution security certificate
  • 相关文献

参考文献3

二级参考文献22

  • 1李晓勇,沈昌祥.一个动态可信应用传递模型的研究[J].华中科技大学学报(自然科学版),2005,33(z1):310-312. 被引量:14
  • 2Roger L Kay.How to Implement Trusted Computing,A Guide to Tighter Enterprise Security[ OL]. https://www. tmstedeomputinggroup.org/news/Industry_ Data/Implementing_ Trust- ed_ Computing_ RK. pdf. 被引量:1
  • 3Microsoft. Next-generation secure Application base [ OL ]. http://www. microsoft. com/resources/ngscb. 被引量:1
  • 4TCG. TCG Specification Architecture Overview, Version1.2 [OL]. https://www. trustedcomputinggroup. org, 2004 - 04 - 28. 被引量:1
  • 5Ahmad-Reza Sadeghi, Christian Stuble. Property-based attestation for computing platforms:caring about properties, not mechanisms[ A]. in Proceedings of the 20004 workshop on New security paradigrns, Nova Scotia, CANADA. ACM Press, September 2004:66 - 77. 被引量:1
  • 6J Poritz,M Schunter, E V Herreweghen, and M Waldner.Property attestation-scalable and privacy-friendly security assessment of peer computers,IBM Research Report RZ 3548,2004[OL]. http://domino.watson. ibm. com/library/cyberdig. nsf/papers/215E33CB2B4F7FA485256E971XEA0D6C/$ File/ rz3548.pdf. 被引量:1
  • 7E Shi,A Perrig, and L van Doorn. Bind:A fine-grained attestation service for secure distributed systems[A]. In Proc. of the IEEE Symposium on Security and Privacy[C],2005. 154- 168. 被引量:1
  • 8Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doom. Design and implementation of a TCG-based integrity measurement architecture[ A]. The 13th Usenix Security Symposium[ C]. San Diego,2004. 被引量:1
  • 9A Seshadri, A Perrig, L van Doom, and P Khosla. SWATT: software-based attestation for embedded devices[ A ]. In Proceedings of IEEE Symposium on Security and Privacy [ C ]. Oakland, CA, USA: IEEE. Press,May 2004.272 - 282. 被引量:1
  • 10V Haldar, D Chandra, and M Franz. Semantic remote attestation-a virtual machine directed approach to trusted computing [ A]. In Proc. of the Third virtual Machine Research and Technology Symposium [ C ]. San Jose, CA, USA: USENIX, 2004. 29 - 41. 被引量:1

共引文献28

同被引文献15

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部