Yong Zhao
College of Computer Science, Beijing University of Technology, Beijing 100124, China
Fei Xue
College of Computer Science, Beijing University of Technology, Beijing 100124, China
Yanxue Zhang
College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang, 050000, China
ABSTRACT
Remote attestation is the key technology of trusted cloud computing. The existed remote attestation schemes are not sufficient to consider the trusted measurement of the running virtual computing node. In this study, by the analysis and comparison of existing remote attestation schemes, we propose a trusted measurement of the running virtual computing node and a threshold remote attestation scheme based on the trusted measurement results. By RO security analysis and a simulation, we verify the security and efficiency of the scheme. The trusted measurement of the running platform is mainly based on the trusted measurement of the programs running on the platform and a total trust value of the platform by an algorithm. The Threshold remote attestation for trusted measurement of the running platform is based on K-CCA problem.
PDF References Citation
How to cite this article
Yong Zhao, Fei Xue and Yanxue Zhang, 2013. Threshold Remote Attestation on Trusted Cloud Computing. Journal of Applied Sciences, 13: 1592-1596.
DOI: 10.3923/jas.2013.1592.1596
URL: https://scialert.net/abstract/?doi=jas.2013.1592.1596
DOI: 10.3923/jas.2013.1592.1596
URL: https://scialert.net/abstract/?doi=jas.2013.1592.1596
REFERENCES
- Bradshaw, R.W., J.E. Holt and K.E. Seamons, 2004. Concealing complex policies with hidden credentials. Proceedings of the 11th ACM Conference on Computer and Communications Security, October 25-29, 2004, Washington, DC, USA., pp: 146-157.
CrossRef - Brassil, J., 2010. Physical layer network isolation in multi-tenant clouds. Proceedings of the 30th International Conference on Distributed Computing Systems Workshops, June 21-25, 2010, Genoa, Italy, pp: 77-81.
CrossRef - Dahbur, K., B. Mohammad and A.B. Tarakji, 2011. A survey of risks, threats and vulnerabilities in cloud computing. Proceedings of the 2nd International Conference on Intelligent Semantic Web-Services and Applications, April 18-20, 2011, Amman, Jordan.
Direct Link - Schellekens, D., B. Wyseur and B. Preneel, 2008. Remote attestation on legacy operating systems with trusted platform modules. Sci. Comput. Programm., 74: 13-22.
CrossRefDirect Link - Santos, N., K.P. Gummadi and R. Rodrigues, 2009. Towards trusted cloud computing. Proceedings of the Conference on Hot Topics in Cloud Computing, June 14-19, 2009, Berkeley, CA, USA.
Direct Link - Wang, J.S., Z. Yu and G. Li, 2008. Study of trusted chain technology of computing trusted. Comput. Eng. Des., 29: 2195-2198.
Direct Link - Hu, J.F., L.X. Li, Y.Z. Zhou and F.L. Li, 2009. Framework of dynamic remote attestation based on policy and virtual machine technology. J. Wuhan Univ. (Natl. Sci. Edn.), 1: 45-48.
Direct Link