Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp

被引:0
|
作者
Zhai, Guang-hui [1 ]
Li, Juan [1 ,2 ]
Song, Cheng [3 ]
机构
[1] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Henan, Peoples R China
[2] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Herts, Peoples R China
[3] Henan Polytechn Univ, Coll Comp Sci & Technol, Jiaozuo, Herts, Peoples R China
关键词
Key Synchronization; Trusted Storage; Authorization Dat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the important functionalities in trusted computing platform is secure storage. Although the technologies about secure storage in trusted computing platform become more sophisticated, and the applications are increasingly popular, the key authorization management mechanism still needs further improvement. Aiming at the key synchronization problem of the key authorization data update in the existing schemes, we propose a timestamp-based trusted storage key management scheme. The proposed scheme can effectively solve the key synchronization problem and disadvantages in the existing schemes, so the trust and security of the trusted storage is further enhanced.
引用
收藏
页码:327 / +
页数:2
相关论文
共 50 条
  • [1] Trusted network authorization scheme based on cloud model
    Wu, Kun
    Li, Chuyan
    Journal of Convergence Information Technology, 2012, 7 (03) : 183 - 191
  • [2] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
  • [3] A trusted key management scheme for digital rights management
    Jeong, Y
    Yoon, K
    Ryou, J
    ETRI JOURNAL, 2005, 27 (01) : 114 - 117
  • [4] Research of key management based on trusted module for cloud storage user
    Zhao, Bo
    Li, Yifan
    Milan, Heinayati
    Fei, Yongkang
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 25 - 31
  • [5] A Key Management Scheme for Establishing an Encryption-based Trusted IoT System
    Mamun, Quazi
    Rana, Muhammad
    2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 41 - 46
  • [6] An Improved Authorization System Base on Trusted Network
    Gao, Yonghu
    Zhang, Xiaozhe
    Gao, Xianming
    Ma, Shicong
    Meng, Xiangbo
    2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2013, : 327 - 330
  • [7] An improved timestamp-based remote user authentication scheme
    Awasthi, Amit K.
    Srivastava, Keerti
    Mittal, R. C.
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (06) : 869 - 874
  • [8] A HIPAA-compliant key management scheme with revocation of authorization
    Lee, Wei-Bin
    Lee, Chien-Ding
    Ho, Kevin I. -J.
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2014, 113 (03) : 809 - 814
  • [9] Secure Authorization for Controlling Access via Key Management Scheme
    Hsiao, Tsung-Chih
    Chen, Tzer-Long
    Chen, Chih-Sheng
    Xu, Fu-Sheng
    Tsui, Starlition
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [10] A Trusted Authorization Scheme for E-commerce Systems
    Hu Ronglei
    Duan Xiaoyi
    Li Zhaobin
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,