Xing RONG, Chang-xiang SHEN, Rong JIANG, et al. Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree[J]. Journal on Communications, 2017, 38(9): 31-38.
DOI:
Xing RONG, Chang-xiang SHEN, Rong JIANG, et al. Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree[J]. Journal on Communications, 2017, 38(9): 31-38. DOI: 10.11959/j.issn.1000-436x.2017180.
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
an improved remote attestation scheme based on unbalanced hash tree of cloud platform was proposed.Double-layer unbalanced hash tree was built by introducing layer
original single tree was expanded to main tree and sub tree
which corresponded to virtual machine in cloud platform and the running components in virtual machine.Attestation needs no more than measurement component and authentication path.The analysis shows that this scheme can increase the attestation efficiency of cloud platform
and is good at protecting privacy and expandability
which is suitable for validating cloud platform service.
关键词
Keywords
references
SANTOS N , GUMMADI K P , RODRIGUES R . Towards trusted cloud computing [C ] // Conference on Hot Topics in Cloud Computing . 2009 : 1 - 5 .
ZHANG H G , LUO J , JIN G , et al . Research progress of trusted computing environment [J ] . Journal of Wuhan University:Natural Science Edition , 2006 , 52 ( 5 ): 513 - 518 .
SAILER R , ZHANG X , JAEGER T , et al . Design and implementation of a TCG-based integrity measurement architecture [C ] // USENIX Security Symposium . 2004 : 223 - 238 .
WENG X K , ZHANG P , WANG W , et al . Remote attestation mechanism for platform integrity based on unbalanced-hash tree [J ] . Journal of Computer Applications , 2014 , 34 ( 2 ): 433 - 437 .
YAN J , ZHAO Y . Trusted attestation of behavior measurement based on Merkle hash tree [J ] . Journal of Computational Information Systems , 2013 , 9 ( 9 ): 3443 - 3451 .
ZHU Y , LI Q B , ZHONG C L , et al . Non-balanced binary hash-tree model for fine-grained integrity measurement [J ] . Journal of Chinese Computer Systems , 2014 , 35 ( 7 ): 1604 - 1609 .
ENGLAND P , . Practical techniques for operating system attestation [C ] // Trusted Computing Challenges and Applications,First International Conference on Trusted Computing and Trust in Information Technologies,Trust 2008 . 2008 : 1 - 13 .