Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp

被引:0
|
作者
Zhai, Guang-hui [1 ]
Li, Juan [1 ,2 ]
Song, Cheng [3 ]
机构
[1] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Henan, Peoples R China
[2] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Herts, Peoples R China
[3] Henan Polytechn Univ, Coll Comp Sci & Technol, Jiaozuo, Herts, Peoples R China
关键词
Key Synchronization; Trusted Storage; Authorization Dat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the important functionalities in trusted computing platform is secure storage. Although the technologies about secure storage in trusted computing platform become more sophisticated, and the applications are increasingly popular, the key authorization management mechanism still needs further improvement. Aiming at the key synchronization problem of the key authorization data update in the existing schemes, we propose a timestamp-based trusted storage key management scheme. The proposed scheme can effectively solve the key synchronization problem and disadvantages in the existing schemes, so the trust and security of the trusted storage is further enhanced.
引用
收藏
页码:327 / +
页数:2
相关论文
共 50 条
  • [31] The key security management scheme of cloud storage based on blockchain and digital twins
    Jie Huang
    Jiangyi Yi
    Journal of Cloud Computing, 13
  • [32] Trusted Blockchain-Based Signcryption Protocol and Data Management for Authentication and Authorization in VANETs
    Su, Jinqi
    Ren, Runtao
    Li, Yinghao
    Lau, Raymond Y. K.
    Shi, Yikuan
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [33] Trusted Blockchain-Based Signcryption Protocol and Data Management for Authentication and Authorization in VANETs
    Su, Jinqi
    Ren, Runtao
    Li, Yinghao
    Lau, Raymond Y. K.
    Shi, Yikuan
    Wireless Communications and Mobile Computing, 2022, 2022
  • [34] Towards a Trusted Hadoop Storage Platform: Design Considerations of an AES Based Encryption Scheme with TPM Rooted Key Protections
    Cohen, Jason
    Acharya, Subatra
    2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 444 - 451
  • [35] An Improved ID-Based Key Management Scheme in Wireless Sensor Network
    Chatterjee, Kakali
    De, Asok
    Gupta, Daya
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2012, PT II, 2012, 7332 : 351 - 359
  • [36] Operating system network security enhancement scheme based on trusted storage
    Qi L.
    Lv X.
    Sun L.
    Yao T.
    Yu J.
    Wang L.
    Intelligent and Converged Networks, 2023, 4 (02): : 127 - 141
  • [37] Improved Group-key-management Scheme for WSN
    Niu Dou
    Yao Yan-yan
    Wang Ting-ting
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 330 - 333
  • [38] Improved ring signature scheme without trusted key generation center for wireless sensor network
    Xiao J.-F.
    Zeng G.-H.
    Journal of Shanghai Jiaotong University (Science), 2009, 14 E (02) : 189 - 194
  • [39] An Improved Ring Signature Scheme without Trusted Key Generation Center for Wireless Sensor Network
    肖俊芳
    曾贵华
    Journal of Shanghai Jiaotong University(Science), 2009, 14 (02) : 189 - 194
  • [40] A Trusted Third Party-Based Key Agreement Scheme in Cloud Computing
    Li, Ying
    Du, Liping
    Zhao, Guifen
    Feng, Fuwei
    INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING TECHNIQUES, ISCIDE 2015, PT II, 2015, 9243 : 407 - 412