Font Size: a A A

Research On User Attributes In Strengthening The Security Of Remote Attestation

Posted on:2016-03-13Degree:MasterType:Thesis
Country:ChinaCandidate:X W ZhangFull Text:PDF
GTID:2308330470952020Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the rapid development of science and technology, computer isbecoming more and more important. The relationship of today’s society andcomputers become more and more closely. In recent years, the cloud computing,big data, mobile Internet and wireless communications are widely used inpublic services, such as in finance, government, education etc. At the same time,the security of computer platform encounter the greatest degree of challenge.Personal computer and server are faced with more and more serious securityproblem. The traditional security protection measures such as firewall,anti-virussoftware, intrusion detection system gradually get into trouble. These securitymeasures are more likely to give protection software application layer, and somevariation of the virus such as Trojans can infect your computer by hardware. Inother words, protection has not formed yet, the computer has been infected. Sohow to effectively ensure the safety of users and the platform has become anurgent problem, and the emergence of trusted computing brings a new solutionfor these issues.By configuring the Trusted Platform Module with a security platform for thecomputer hardware detection feature, trusted computing takes the TCG softwarestack TSS (TCG Software Stack) as the interface to provide access to the upper application of trusted computing software system. Thus combining TPM andTSS to build up a trusted environment of software and hardware. The basic ideaof trusted computing is as follows. In a computer system, first to build a trustedroot, and then establish a trust chain, starting from the root of trust to thehardware platform, the operating system, then the application. To insure onelevel measurement one level, one trust one level, to extend that trust to the entirecomputer system, to ensure the computer system is reliable.Remote attestation of trusted computing technology is a very importantapplication. The remote attestation technology can verify whether they havecredibility computing environments or not, and whether it can effectively detectsecurity configuration platform to prevent potential security threats for a varietyof high-level network. Thus provide effective support, which can provide areliable basis for building trust relationships in a network environment. In orderto solve the poor safety and can’t reflect the problem of the user characteristic inremote attestation, a scheme of remote attestation based on user attributes isproposed. In the process of generating trusted evidence and credible verification,the scheme uses password to encryption and decryption. This thesis uses TPMEmulator and Java TCG Software Stack to build experimental platform.This paper made Based a comprehensive comparison on user attributesremote attestation, authentication and access control. At the same time, give aanalysis about its security, and finally through the experiment to realize remoteattestation scheme based on user attributes. The experimental results show that the scheme is feasible. Comparing to the remote attestation based on AES, it cannot only strengthen the security of the transmission, but also can reflect usercharacteristic. With respect to the attribute-based remote attestation scheme, itimproves the verification efficiency.
Keywords/Search Tags:Trusted computing, Remote attestation, PBE, Userattributes, TPM
PDF Full Text Request
Related items