›› 2012, Vol. 42 ›› Issue (04): 985-991.

Previous Articles     Next Articles

Trusted computing sealing scheme based on reverse extending

WEI Zhan-zhen1, LI Wei2, CHI Ya-ping1, FANG Yong1   

  1. 1. Department of Communication, Beijing Electronic and Science Technology Institute, Beijing 100070, China;
    2. School of Telecommunications Engineering, Xidian University, Xi'an 710071, China
  • Received:2011-04-26 Online:2012-07-01 Published:2012-07-01

Abstract: Data sealing can not achieve asynchronous sealing and unsealing operation in application layer multitasking environment. To overcome this problem, we propose an improved sealing approach for trusted computing, in which a new register PCR_R is introduced into TCM. It uses the metrics reversible extending scheme to guarantee the state of platform in application layer unanimous. The improved sealing approach also uses the real-time validation of trusting state provided by Root of Trust for Reporting (RTR) and Stored Measurement Log (SML) to solve the asynchronous sealing and unsealing operation in application layer multitasking environment.

Key words: computer application, trusted computing, trusted cryptography module (TCM), data sealing, PCR extend

CLC Number: 

  • TP391
[1] 沈昌祥,张焕国,冯登国,等. 信息安全综述[J]. 中国科学E辑:信息科学,2007,37(2):129-155. Shen Chang-xiang, Zhang Huan-guo, Feng Deng-guo, et al. Survey on information security[J]. Science in China(Series E:Information Sciences), 2007, 37(2):129-155.
[2] 张焕国,罗捷,金刚,等. 可信计算研究进展[J]. 武汉大学学报:理学版, 2006, 52(5):513-518. Zhang Huan-guo, Luo Jie, Jin Gang, et al. Development of trusted computing research[J]. Journal of Wuhan University(Natural Science Edition), 2006, 52(5):513-518.
[3] Trusted Computing Group. TCG specification architecture overview specification. Revision 1.4... http://www.trustedco-mputinggroup.org.
[4] Trusted Computing Group. TPM main part 3 commands, specification version 1.2, Level 2 Revision 103.. http://www.trustedcomputinggroup.org.
[5] Ulrich Kuhn, Marcel Selhorst, Christian Stuble. Realizing property-based attestation and sealing with commonly available hard-and software//Proceeding of the 2007 ACM Workshop on Scalable Trusted Computing,Alexandria, Virginia, USA, 2007:50-57.
[6] Wang Dan, Feng Deng-guo. A hypervisor-based secure storage scheme//Proceeding of the Second International Conference on Networks Security, Wireless Communications and Trusted Computing, Wuhan, Hubei, China, 2010:81-86.
[7] Elior Vila, Plamenka Borovska. Data protection utilizing trusted platform module//Proceedings of the 9th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing, Gabrovo, Bulgaria, 2008:1-6.
[8] Emanuele Cesena, Gianluca Ramunno, Davide Vernizzi. Secure storage using a sealing proxy//Proceedings of the ACM SIGOPS European Workshop on System Security (EUROSEC), Glasgow, Scotland, 2008:27-34.
[9] 赵波,张焕国,李晶,等.可信PDA计算平台系统结构与安全机制[J].计算机学报, 2010, 33(1):82-92. Zhao Bo, Zhang Huan-guo, Li Jing, et al. The system architecture and security structure of trusted PDA[J]. Chinese Journal of Computers, 2010, 33(1):82-92.
[10] 刘孜文,冯登国. 基于可信计算的动态完整性度量架构[J]. 电子与信息学报, 2010, 32(4):875-879. Liu Zi-wen, Feng Deng-guo. TPM-based dynamic integrity measurement architecture[J]. Journal of Electronics & Information Technology, 2010, 32(4):875-879.
[1] LIU Fu,ZONG Yu-xuan,KANG Bing,ZHANG Yi-meng,LIN Cai-xia,ZHAO Hong-wei. Dorsal hand vein recognition system based on optimized texture features [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1844-1850.
[2] WANG Li-min,LIU Yang,SUN Ming-hui,LI Mei-hui. Ensemble of unrestricted K-dependence Bayesian classifiers based on Markov blanket [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1851-1858.
[3] JIN Shun-fu,WANG Bao-shuai,HAO Shan-shan,JIA Xiao-guang,HUO Zhan-qiang. Synchronous sleeping based energy saving strategy of reservation virtual machines in cloud data centers and its performance research [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1859-1866.
[4] ZHAO Dong,SUN Ming-yu,ZHU Jin-long,YU Fan-hua,LIU Guang-jie,CHEN Hui-ling. Improved moth-flame optimization method based on combination of particle swarm optimization and simplex method [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1867-1872.
[5] LIU En-ze,WU Wen-fu. Agricultural surface multiple feature decision fusion disease judgment algorithm based on machine vision [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(6): 1873-1878.
[6] OUYANG Dan-tong, FAN Qi. Clause-level context-aware open information extraction [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1563-1570.
[7] LIU Fu, LAN Xu-teng, HOU Tao, KANG Bing, LIU Yun, LIN Cai-xia. Metagenomic clustering method based on k-mer frequency optimization [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1593-1599.
[8] GUI Chun, HUANG Wang-xing. Network clustering method based on improved label propagation algorithm [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1600-1605.
[9] LIU Yuan-ning, LIU Shuai, ZHU Xiao-dong, CHEN Yi-hao, ZHENG Shao-ge, SHEN Chun-zhuang. LOG operator and adaptive optimization Gabor filtering for iris recognition [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1606-1613.
[10] CHE Xiang-jiu, WANG Li, GUO Xiao-xin. Improved boundary detection based on multi-scale cues fusion [J]. Journal of Jilin University(Engineering and Technology Edition), 2018, 48(5): 1621-1628.
[11] ZHAO Hong-wei, LIU Yu-qi, DONG Li-yan, WANG Yu, LIU Pei. Dynamic route optimization algorithm based on hybrid in ITS [J]. 吉林大学学报(工学版), 2018, 48(4): 1214-1223.
[12] HUANG Hui, FENG Xi-an, WEI Yan, XU Chi, CHEN Hui-ling. An intelligent system based on enhanced kernel extreme learning machine for choosing the second major [J]. 吉林大学学报(工学版), 2018, 48(4): 1224-1230.
[13] FU Wen-bo, ZHANG Jie, CHEN Yong-le. Network topology discovery algorithm against routing spoofing attack in Internet of things [J]. 吉林大学学报(工学版), 2018, 48(4): 1231-1236.
[14] CAO Jie, SU Zhe, LI Xiao-xu. Image annotation method based on Corr-LDA model [J]. 吉林大学学报(工学版), 2018, 48(4): 1237-1243.
[15] HOU Yong-hong, WANG Li-wei, XING Jia-ming. HTTP-based dynamic adaptive streaming video transmission algorithm [J]. 吉林大学学报(工学版), 2018, 48(4): 1244-1253.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!