Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unob...
详细信息
Ubiquitous interaction in a pervasive environment is the main attribute of smart spaces. Pervasive systems are weaving themselves in our daily life, making it possible to collect user information invisibly, in an unobtrusive manner by known and even unknown parties. Huge number of interactions between users and pervasive devices necessitate a comprehensive trust model which unifies different trust factors like context, recommendation, and history to calculate the trust level of each party precisely. trusted computing enables effective solutions to verify the trustworthiness of computing platforms. In this paper, we elaborate Unified Trust Model (UTM) which calculates entity's trustworthiness based on history, recommendation, context and platform integrity measurement, and formally use these factors in trustworthiness calculation. We evaluate UTM behaviour by simulating in different scenario experiments using a Trust and Reputation Models Simulator for Wireless Sensor Networks. We show that UTM offers responsive behaviour and can be used effectively in the low interaction environments.
One important function in trusted computing is protected storage, which can protect unlimited amount of data and keys. In the existing trusted platform module (TPM) key loading scheme for trustedplatform, a computi...
详细信息
One important function in trusted computing is protected storage, which can protect unlimited amount of data and keys. In the existing trusted platform module (TPM) key loading scheme for trustedplatform, a computing platform with TPM as its trusted anchor, the total times of loading operation is the same as the number of the loaded target object's ancestors, resulting in low efficiency of loading a TPM key which has many ancestors. To improve efficiency, an identity-based TPM key loading scheme is proposed. In this scheme, the times of loading operation is only two when any TPM key is loaded into TPM. Therefore, the required time cost for loading a TPM key can be reduced, especially for complex TPM key storage hierarchy. By analyzing the correctness, security, efficiency and feasibility, the proposed scheme has the better theoretical and application value.
Mobile agent systems (MAS) suffer from security holes that in a crisisdisaster management system can be fatal. trusted computing group's TPM chip can be used to solve the problem but only partially. The extreme ph...
详细信息
Mobile agent systems (MAS) suffer from security holes that in a crisisdisaster management system can be fatal. trusted computing group's TPM chip can be used to solve the problem but only partially. The extreme physical conditions and particularities of the crisis management agent platform do not permit the full exploitation of the TPM's features. To solve this problem the use of a special purpose hardware module, physically connected to a host crisis management device as a local trusted third party, has been proposed. In this paper, we analyze the functionality and structure of such a hardware module, called Autonomous Attestation Token (AAT) and show how a successful attack can be launched on it. To counter this attack, we propose a more sophisticated key release protocol for the communication between the AAT and the host device. This is achieved by securing the communication channel between the two devices. Also, a detailed hardware structure of the AAT is proposed. This hardware structure support the proposed key release protocol. To further analyze this, we identify the basic operations needed by the AAT hardware components and propose a sequence of actions and associated signals that those components need to follow to support those operation.
The SITDRM Enterprise system [1] protects private customer data by allowing customers to provide policies in the form of a machine-readable license. When employees of an organization want to use customers' data, t...
详细信息
The SITDRM Enterprise system [1] protects private customer data by allowing customers to provide policies in the form of a machine-readable license. When employees of an organization want to use customers' data, they must be forced to abide by the licences provided. Some sort of hardened terminal must be used to ensure that not only the hardware and software will cooperate, but that the user of the terminal will too. We use the trusted Computing Group's specifications for a trustedplatform upon which to build a data user terminal that can be proved to implement correct license-enforcing behavior. A trusted platform module (TPM) and a TPM-using operating system are all that may be required to construct a verifiably secure terminal.
trusted computing is an idea worth dusting off. Although it has been a bit of a flop for the better part of a half century, we might be experiencing a perfect storm regarding the motivations and capabilities needed to...
详细信息
trusted computing is an idea worth dusting off. Although it has been a bit of a flop for the better part of a half century, we might be experiencing a perfect storm regarding the motivations and capabilities needed to realize trusted computing. You might not be able to buy complete trusted systems today. However, in the coming years, the development of trusted computing hopefully will give us more assurance in the systems we use and ultimately more trust in the transactions we make on the Internet every day.
作者:
Landau, SusanSun Microsyst.
Santa Clara CA Abstract Authors References Cited By Keywords Metrics Similar Download Citation Email Print Request Permissions
Recent events spawned a need for better communications of security systems, including industrial control systems and emergency management systems. This work is in initial phases and the author reports it here. In this...
详细信息
Recent events spawned a need for better communications of security systems, including industrial control systems and emergency management systems. This work is in initial phases and the author reports it here. In this final column for emerging standards and technologies, she also discusses the privacy and security challenges of Web 2.0 and globalization.
The trusted platform module (TPM) is a system component that provides a hardware-based approach to establish trust in a platform. The latest TPM2.0 specification was accepted as the ISO standard in 2015. It offers fun...
详细信息
The trusted platform module (TPM) is a system component that provides a hardware-based approach to establish trust in a platform. The latest TPM2.0 specification was accepted as the ISO standard in 2015. It offers functionality for key management by storing keys into the TPM's protected storage. The access to the TPM-resident key object is protected by the session-based authorisation mechanism. This mechanism is keyed to the object's authorisation value known as authValue and the session-bound secret value known as sessionKey. The new authValue introduced into the TPM is protected by the session-based encryption mechanism, which is also keyed on the sessionKey. In the authors' study, they conduct a formal analysis of the TPM2.0 HMAC (hash message authentication code) authorisation mechanism used in the key management. They first use the stateful applied pi calculus to formalise the session-based HMAC authorisation and encryption mechanisms in a model of TPM2.0 API commands. They propose a threat model to formalise the secrecy and authentication properties. Then they discuss several attacking scenarios in practice where the sessionKey could be disclosed. They also instantiate their threat model according to specific attacking scenarios. By using the SAPIC tool and the tamarin prover, they automatically give out the analysis results of their models.
The trusted computing technology embodied in the trusted platform module secure-coprocessor from the trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the co...
详细信息
The trusted computing technology embodied in the trusted platform module secure-coprocessor from the trusted Computing Group is a hardware-based root of trust that makes it possible for the system designer--not the computer owner--to regulate which programs can run on a given computer. If system designers are evil, then they can use trusted computing to prevent a competitors' programs from being installed, thus creating or preserving a monopoly. When computer owners are incompetent, though, benevolent system designers can use trusted computing to prevent malware from being installed and run.
In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestatio...
详细信息
In order to solve the contradictions between user privacy protection and identity authentication, an anonymous authentication scheme under mobile Internet is proposed, which is based on the direct anonymous attestation of trusted computing and uses the encrypting transfer and signature validation for its implementation. Aiming at two access mode of trusted mobile terminal under mobile Internet, self access and cross-domain access, the authentication process of each mode is described in details. The analysis shows that the scheme implements anonymous authentication on mobile Internet and is correct, controllable and unforgeable.
暂无评论