共查询到20条相似文献,搜索用时 46 毫秒
1.
2.
When using trusted computing technology to build a trusted virtual platform environment,it is a hot problem that how to reasonably extend the underlying physical TPM certificate chain to the virtual machine environment.At present,the certificate trust expansion schemes are not perfect,either there is a violation of the TCG specifications,or TPM and vTPM certificate results inconsistent,either the presence of key redundancy,or privacy CA performance burden,some project cannot even extend the certificate trust.Based on this,a new extension method of trusted certificate chain was proposed.Firstly,a new class of certificate called VMEK (virtual machine extension key) was added in TPM,and the management mechanism of certificate VMEK was constructed,the main feature of which was that its key was not transferable and could be used to sign and encrypt the data inside and outside of TPM.Secondly,it used certificate VMEK to sign vTPM’s vEK to build the trust relationship between the underlying TPM and virtual machine,and realized extension of trusted certificate chain in virtual machine.Finally,in Xen,VMEK certificate and its management mechanism,and certificate trust extension based on VMEK were realized.The experiment results show that the proposed scheme can effectively realize the remote attestation function of virtual platform. 相似文献
3.
当前,虚拟机技术和可信计算技术是两大热门技术,可信计算技术是实现信息系统安全的重要手段。是否可以在虚拟机的环境下,通过结合虚拟机和可信计算的技术优势,来实现终端系统与网络的可信,提高整个信息系统的安全?研究了如何设计一个基于虚拟机的可信计算平台安全架构,并进一步研究了虚拟化TPM的问题。同时,分析并总结了TCG定义的可信链技术。在此基础上,提出了虚拟机环境下可信链的实现方法,加强终端系统与网络的安全性。 相似文献
4.
Whether the cloud computing environment is credible is the key factor in the promotion and effective use of cloud computing.For this reason,the expected value decision method in risk decision-making was improved.The usage scenarios was redefined,the cost and benefit of audit scheme was digitized,and a virtual machine trusted auditing strategy based on improved expectation decision method was proposed.Several levels of security protection for the user virtual machine was provided,and the optimal audit scheme was selected autonomously according to the security protection level chosen by the user for the virtual machine.The virtual machine introspection (VMI) technology was used to obtain the virtual machine information that needs to be audited.The designed encryption mechanism was used to protect the security of users selected security protection level,so as to ensure the security of user virtual machine selection audit strategy.Finally,the simulation results show that the scheme has good performance and validity. 相似文献
5.
针对目前在云计算环境中用户虚拟计算环境不可信的问题,利用可信平台模块虚拟化技术,在云服务器端为用户构造一个虚拟可信平台模块,然后以虚拟可信平台模块为基石,为用户在云服务器端构造了一个虚拟的可信计算环境,从而使现有的云计算用户中虚拟计算环境的可信情况获得了有效保障。通过与现有的可信平台模块虚拟化方案作对比发现,所提方案不仅周全地考虑了在云计算中虚拟机效率损耗的相关问题,而且相较显著提高了它的安全性和执行效率,更加适合被应用于用户虚拟计算环境。 相似文献
6.
在可搜索加密方案中,无论是云端服务器还是用户,都可能存在欺骗行为。为了解决这种安全问题,给出公平性安全的定义,提出基于区块链的可搜索加密方案。通过第三方可信机构(trusted authority,TA)验证数据传输过程中数据的一致性,区块链记录完整验证结果以防止篡改,使所涉及的实体达成一致的安全共识,从而实现公平性安全。安全性与复杂性分析表明,该方案是可行的。当该方案与搜索结果可验证的可搜索加密方案相结合时,可优化成基于区块链的搜索结果可验证的可搜索加密方案,其安全性将得到进一步的提高。 相似文献
7.
8.
针对当前移动终端支付系统的安全性问题,分析了可信计算技术的基本思想,利用双线性对及离散对数问题的数学知识,提出了一种在可信移动平台上结合SIM卡的数字签名方案,增加了移动终端系统的安全性。为了防止消息在公共信道被篡改,利用用户与签名者的一次一密密码加密系统对消息和签名进行加密处理。最后,给出该方案的正确性证明和安全性分析,证明该方案在理论上可行且具有很高的安全性。 相似文献
9.
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection. 相似文献
10.
One important function in trusted computing is protected storage,which can protect unlimited amount of data and keys.In the existing trusted platform module(TPM)key loading scheme for trusted platform,a computing platform with TPM as its trusted anchor,the total times of loading operation is the same as the number of the loaded target object's ancestors,resulting in low efficiency of loading a TPM key which has many ancestors.To improve efficiency,an identity-based TPM key loading scheme is proposed.In this scheme,the times of loading operation is only two when any TPM key is loaded into TPM.Therefore,the required time cost for loading a TPM key can be reduced,especially for complex TPM key storage hierarchy.By analyzing the correctness,security,efficiency and feasibility,the proposed scheme has the better theoretical and application value. 相似文献
11.
In order to ensure the security of information systems, it's essential to make sure that system behav-iors are trusted. By analyzing threats that exist in execu-ting procedures, a trust model based on structured pro-tection is proposed. We consider that functional compo-nents, system actions and message flows between com-ponents are three key factors of information systems. Structured protection requirements on components, con-nections and action parameters are also provided. Four trusted properties of the model are deducted through formal analysis, and trusted system behavior is defined based on these properties. Furthermore, decision theo-rem of trusted system behavior is proved. The devel-oped prototype system indicates the model is practical. It is a general theory model built on logic deduction and independent on specific environment and the behaviors of the system designed and implemented following the model are trusted. 相似文献
12.
The virtual machine may face the problem of information leakage in live migration.Therefore,a dynamic memory protection technique SGX was introduced and a security enhancement live migration method based on KVM environment was proposed.Firstly,on both sides of migration,a hardware-isolated secure execution environment centered SGX was built.It guaranteed the security of operations like encryption and integrity measurement and also ensured the security of private data.An encrypted channel to transfer migration data based on the remote attestation between the secure execution environments of both migration sides was constructed.And the mutual authentication of both sides’ platform integrity was realized.Finally,the security enhancement effect and did the experiment was analyzed.The results shows that the introduction of SGX won’t cause much negative effect to the migration performance. 相似文献
13.
14.
Information security technology confronts severe challenges because of the safety demands of cloud computing.The trustworthiness and self-safety of cloud computing platform are the foundation of cloud computing security.The confidence of cloud users is the key issue the deep development and popularization for cloud computing.The trusted cloud computing technology provides a feasible solution.From the standpoint of guaranteeing the trustworthiness of cloud computing platform,related research progresses on trusted virtualization,construction of trusted cloud platform and trusted virtual machine were introduced.Additionally,the characteristics,application scopes and effectiveness of typical schemes were analyzed and compared.Finally,current limitations and possible directions for future research were discussed. 相似文献
15.
16.
17.
18.
基于离散对数的代理签名方案,一般分为需要可信中心和不需要可信中心两种。但在现实中,许多特定的应用环境下,一个完全可信的第三方认证中心并不存在,而且在第三方认讧中心出现问题时。吞易对信息的安全性造成直接影响。因此,构造一个不需要可信中心的代理签名方案显得非常重要。它通过对代理授权信息的盲化,加强了信息的安全性,使得授权信息可以在公共信道中传输。这样不但保证了方案在授权阶段的信息保密性,还在一定程度上提高了方案的性能。 相似文献
19.
20.
介绍了MEC安全问题的特征,分析了可信计算技术增强MEC安全的可行性,提出了MEC物理安全可信设计、MEC能力开放可信设计、软件版本完整性可信设计等关键技术,最后结合MEC部署的特点提出了安全防护的建设建议。 相似文献