Journal of Applied Sciences1812-56541812-5662Asian Network for Scientific Information10.3923/jas.2013.1592.1596ZhaoYong XueFei ZhangYanxue 92013139Remote attestation is the key technology of trusted cloud
computing. The existed remote attestation schemes are not sufficient to consider
the trusted measurement of the running virtual computing node. In this study,
by the analysis and comparison of existing remote attestation schemes, we propose
a trusted measurement of the running virtual computing node and a threshold
remote attestation scheme based on the trusted measurement results. By RO security
analysis and a simulation, we verify the security and efficiency of the scheme.
The trusted measurement of the running platform is mainly based on the trusted
measurement of the programs running on the platform and a total trust value
of the platform by an algorithm. The Threshold remote attestation for trusted
measurement of the running platform is based on K-CCA problem.]]>Bradshaw, R.W., J.E. Holt and K.E. Seamons,20042004pp: 146157Brassil, J.,20102010pp: 7781Chang, E., P. Thomson, T. Dillon and F. Hussain,20052005pp: 161-174pp: 161-174Chen, L., R. Landfermann, H. Lohr, M. Rohe, A.R. Sadeghi and C. Stuble,20062006pp: 716Dahbur, K., B. Mohammad and A.B. Tarakji,20112011Dong, J.L.,20122012Schellekens, D., B. Wyseur and B. Preneel,2008741322Holt, J., R. Bradshaw, K. Seamons and H. Orman,20032003pp: 18Li, S.J. and Y.P. He,200930146152Pirker, M., R. Toegl, D. Hein and P. Danner,20092009pp: 101-119pp: 101-119Santos, N., K.P. Gummadi and R. Rodrigues,20092009Wang, J.S., Z. Yu and G. Li,20082921952198Winsborough, W.H. and N. Li,20022002pp: 41-51Greveler, U., B. Justus and D. Loehr,20112011pp: 648653Hu, J.F., L.X. Li, Y.Z. Zhou and F.L. Li,200914548