Subscribe Now Subscribe Today
Research Article
 

Threshold Remote Attestation on Trusted Cloud Computing



Yong Zhao, Fei Xue and Yanxue Zhang
 
Facebook Twitter Digg Reddit Linkedin StumbleUpon E-mail
ABSTRACT

Remote attestation is the key technology of trusted cloud computing. The existed remote attestation schemes are not sufficient to consider the trusted measurement of the running virtual computing node. In this study, by the analysis and comparison of existing remote attestation schemes, we propose a trusted measurement of the running virtual computing node and a threshold remote attestation scheme based on the trusted measurement results. By RO security analysis and a simulation, we verify the security and efficiency of the scheme. The trusted measurement of the running platform is mainly based on the trusted measurement of the programs running on the platform and a total trust value of the platform by an algorithm. The Threshold remote attestation for trusted measurement of the running platform is based on K-CCA problem.

Services
Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

 
  How to cite this article:

Yong Zhao, Fei Xue and Yanxue Zhang, 2013. Threshold Remote Attestation on Trusted Cloud Computing. Journal of Applied Sciences, 13: 1592-1596.

DOI: 10.3923/jas.2013.1592.1596

URL: https://scialert.net/abstract/?doi=jas.2013.1592.1596
 

REFERENCES
Bradshaw, R.W., J.E. Holt and K.E. Seamons, 2004. Concealing complex policies with hidden credentials. Proceedings of the 11th ACM Conference on Computer and Communications Security, October 25-29, 2004, Washington, DC, USA., pp: 146-157.

Brassil, J., 2010. Physical layer network isolation in multi-tenant clouds. Proceedings of the 30th International Conference on Distributed Computing Systems Workshops, June 21-25, 2010, Genoa, Italy, pp: 77-81.

Chang, E., P. Thomson, T. Dillon and F. Hussain, 2005. The Fuzzy and Dynamic Nature of Trust. In: Trust, Privacy and Security in Digital Business, Katsikas, S., J. Lopez and G. Pernul (Eds.). Springer-Verlag, Berlin, Germany, pp: 161-174.

Chen, L., R. Landfermann, H. Lohr, M. Rohe, A.R. Sadeghi and C. Stuble, 2006. A protocol for property-based attestation. Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, November 3, 2006, Alexandria, VA., USA., pp: 7-16.

Dahbur, K., B. Mohammad and A.B. Tarakji, 2011. A survey of risks, threats and vulnerabilities in cloud computing. Proceedings of the 2nd International Conference on Intelligent Semantic Web-Services and Applications, April 18-20, 2011, Amman, Jordan -.

Dong, J.L., 2012. Efficient certificateless anonymous attestation to trusted cloud computing platforms. Int. J. Adv. Comput. Technol., Vol. 4

Greveler, U., B. Justus and D. Loehr, 2011. A privacy preserving system for cloud computing. Proceedings of the 11th IEEE International Conference on Computer and Information Technology, August 31-September 2, 2011, Pafos, Cyprus, pp: 648-653.

Holt, J., R. Bradshaw, K. Seamons and H. Orman, 2003. Hidden credentials. Proceedings of the ACM Workshop on Privacy in the Electronic Society, October 27-30, 2003, Washington DC, USA., pp: 1-8.

Hu, J.F., L.X. Li, Y.Z. Zhou and F.L. Li, 2009. Framework of dynamic remote attestation based on policy and virtual machine technology. J. Wuhan Univ. (Natl. Sci. Edn.), 1: 45-48.
Direct Link  |  

Li, S.J. and Y.P. He, 2009. On privacy of property based remote attestation. J. Commun., 30: 146-152.

Pirker, M., R. Toegl, D. Hein and P. Danner, 2009. A PrivacyCA for Anonymity and Trust. In: Trusted Computing, Chen, L., C.J. Mitchell and A. Martin (Eds.). Springer-Verlag, Berlin, Germany, pp: 101-119.

Santos, N., K.P. Gummadi and R. Rodrigues, 2009. Towards trusted cloud computing. Proceedings of the Conference on Hot Topics in Cloud Computing, June 14-19, 2009, Berkeley, CA, USA -.

Schellekens, D., B. Wyseur and B. Preneel, 2008. Remote attestation on legacy operating systems with trusted platform modules. Sci. Comput. Programm., 74: 13-22.
CrossRef  |  Direct Link  |  

Wang, J.S., Z. Yu and G. Li, 2008. Study of trusted chain technology of computing trusted. Comput. Eng. Des., 29: 2195-2198.
Direct Link  |  

Winsborough, W.H. and N. Li, 2002. Protecting sensitive attributes in automated trust negotiation. Proceedings of the ACM Workshop on Privacy in the Electronic Society, November 21, 2002, Washington, DC, USA., pp: 41-51-.

©  2020 Science Alert. All Rights Reserved