Research on Storage Security Based on Trusted Computing Platform

被引:1
|
作者
He, Jian [1 ]
Xu, Mingdi [2 ]
机构
[1] Commanding Commun Acad, Army Informatizat Construct Teaching & Res Sect, Dept 2, Wuhan 430010, Hubei, Peoples R China
[2] Wuhan Univ, Sch Comp, Wuhan 430079, Peoples R China
来源
PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY | 2008年
基金
中国国家自然科学基金;
关键词
D O I
10.1109/ISECS.2008.144
中图分类号
F [经济];
学科分类号
02 ;
摘要
As an information carrier for multifarious platforms, the security issues about disk storage directly effected system security, dependability and data confidentiality. How to ensure data not to be accessed by unauthorized users effectively, and to guarantee information to be in safe and secure state? Aiming at these problems, we introduce concept of trusted storage (TS), and advance implements about TS through analyzing several access scenarios in practice. Then we put forward a novel scheme for protecting data on personal computer platform. By combing trusted computing platform, we propose a secure and reliable model for user authentication and data encryption. The model uses storage protocol to establish a subsystem to encrypt data, and uses TPM to authenticate different users. We also implement this model by adding it into trusted computing platform. The enhanced platform can not only encrypt data per sector drastically, but also exclude those who can't be authenticated Some external software attacks and physical theft also cut no ice. Deep analysis and comparison show that using TS can help to extend trust chain of platform to peripherals to analyze the security risk of different operation environment. Moreover, TS can enhance communication protocol of storage device to improve security of data flow.
引用
收藏
页码:448 / +
页数:2
相关论文
共 50 条
  • [1] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [3] A new approach to multilevel security based on trusted computing platform
    Zuo, Xiao-Dong
    Liu, Feng-Mei
    Ma, Chao-Bin
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2158 - +
  • [4] Research and Realization of Trusted Computing Platform Based on EFI
    Fang, Weiwei
    Yang, Bingru
    Peng, Zheng
    Tang, ZhiGang
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 43 - 46
  • [5] Research and Design of Trusted Computing Platform
    Zhou Yun-ting
    Deng Mao-lin
    Chong Yu-hai
    Ji Feng-zhu
    He Xiao-gang
    Tang Qi-jie
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1183 - 1188
  • [6] Trusted computing platform based executable code security inspecting model
    Chen, Ze-Mao
    Tang, Wei-Min
    Zhou, Li-Bing
    Liu, Jing-Chao
    Shen, Chang-Xiang
    Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 112 - 116
  • [7] Research on theory and key technology of trusted computing platform security testing and evaluation
    Zhang HuanGuo
    Yan Fei
    Fu JianMing
    Xu MingDi
    Yang Yang
    He Fan
    Zhan Jing
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 434 - 453
  • [8] Research on theory and key technology of trusted computing platform security testing and evaluation
    ZHANG HuanGuo1
    2Key Laboratory of Aerospace Information Security and Trusted Computing
    ScienceChina(InformationSciences), 2010, 53 (03) : 434 - 453
  • [9] Research on theory and key technology of trusted computing platform security testing and evaluation
    HuanGuo Zhang
    Fei Yan
    JianMing Fu
    MingDi Xu
    Yang Yang
    Fan He
    Jing Zhan
    Science China Information Sciences, 2010, 53 : 434 - 453
  • [10] Research and application of trusted computing platform based on portable TPM
    Fang, Weiwei
    Zhou, Changsheng
    Zhang, Ying
    Zhang, Liang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 506 - 509