Мethod of Data Service Integrity Verification Based on Remote Attestation

被引:0
作者
Zhang, Su [1 ]
Zhang, Ying [2 ]
Zhang, Wei [3 ]
Huang, Gang [1 ]
机构
[1] Key Laboratory of High-confidence Software Technology of Ministry of Education, Peking University, Beijing
[2] National Engineering Research Center for Software Engineering, Peking University, Beijing
[3] Internetware Technologies Corporation, Beijing
来源
Ruan Jian Xue Bao/Journal of Software | 2024年 / 35卷 / 11期
关键词
control flow attestation; data integrity; data service; remote attestation (RA); trusted execution environment (TEE);
D O I
10.13328/j.cnki.jos.007001
中图分类号
学科分类号
摘要
As an important production factor, data need to be exchanged between different entities to create value. In this process, data integrity needs to be ensured, or in other words, data cannot be tampered without authorization, or otherwise, it may lead to extremely serious consequences. The existing work realizes data evidence preservation by combining distributed ledger with data encryption and verification technology to ensure the integrity of data to be exchanged in transmission, storage, and other related data processing phrases. However, such work is difficult to confirm the integrity of the data provided by the data supplier. Once the data supplier provides forged data, all subsequent integrity assurance will be meaningless. Therefore, this study proposes a method for verifying the integrity of data services based on remote attestation. By using the trusted execution environment as the trust anchor, this method can measure and verify the integrity of the static code, execution process, and execution result of a specific data service. It also optimizes the integrity verification of a specific data service through program slicing, thus extending the scope of data integrity assurance to the time point when the data supplier provides data. A series of experiments are carried out on 25 data services of three real Java information systems to validate the proposed method. © 2024 Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:4949 / 4972
页数:23
相关论文
共 42 条
[1]  
Opinions on building a more perfect system and mechanism for market based allocation of factors, (2020)
[2]  
Mei H., On Data Governance, (2022)
[3]  
Walport M., Distributed ledger technology: Beyond block chain, UK Government Office for Science, 1, pp. 1-88, (2016)
[4]  
Typical cases of ecological environment law enforcement, (2022)
[5]  
Carey MJ, Onose N, Petropoulos M., Data services, Communications of the ACM, 55, 6, pp. 86-97, (2012)
[6]  
Abadi M, Budiu M, Erlingsson U, Ligatti J., Control-flow integrity principles, implementations, and applications, ACM Trans. on Information and System Security, 13, 1, (2009)
[7]  
Kuznetzov V, Szekeres L, Payer M, Candea G, Sekar R, Song D., Code-pointer integrity, The Continuing Arms Race: Code-reuse Attacks and Defenses, pp. 81-116, (2018)
[8]  
(2023)
[9]  
Trusted Platform Module (TPM)
[10]  
TEE System Architecture v1.3, (2023)