Improved Trusted Storage Key Authorization Management Scheme Based on Timestamp

被引:0
|
作者
Zhai, Guang-hui [1 ]
Li, Juan [1 ,2 ]
Song, Cheng [3 ]
机构
[1] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Henan, Peoples R China
[2] Xuchang Univ, Sch Comp Sci & Technol, Xuchang 461000, Herts, Peoples R China
[3] Henan Polytechn Univ, Coll Comp Sci & Technol, Jiaozuo, Herts, Peoples R China
关键词
Key Synchronization; Trusted Storage; Authorization Dat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the important functionalities in trusted computing platform is secure storage. Although the technologies about secure storage in trusted computing platform become more sophisticated, and the applications are increasingly popular, the key authorization management mechanism still needs further improvement. Aiming at the key synchronization problem of the key authorization data update in the existing schemes, we propose a timestamp-based trusted storage key management scheme. The proposed scheme can effectively solve the key synchronization problem and disadvantages in the existing schemes, so the trust and security of the trusted storage is further enhanced.
引用
收藏
页码:327 / +
页数:2
相关论文
共 50 条
  • [41] Efficient ID-based TPM key loading scheme for trusted platform
    Song C.
    Liu B.
    Hu Z.-M.
    Xin Y.
    Yang Y.-X.
    Yin H.
    Journal of China Universities of Posts and Telecommunications, 2010, 17 (04): : 74 - 79
  • [42] Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy
    Basu, Atanu
    Sengupta, Indranil
    Sing, Jamuna Kanta
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 175 - +
  • [43] A TIMESTAMP-BASED CACHE COHERENCE SCHEME
    MIN, SL
    BAER, JL
    PROCEEDINGS OF THE 1989 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, VOL 1: ARCHITECTURE, 1989, : I23 - I32
  • [45] AN IMPROVED STORAGE MANAGEMENT SCHEME FOR BLOCK STRUCTURED LANGUAGES
    MURTAGH, TP
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1991, 13 (03): : 372 - 398
  • [46] On trusted computer platform key management
    Xu Yi
    Fan Huimin
    AGRO FOOD INDUSTRY HI-TECH, 2017, 28 (01): : 579 - 583
  • [47] A Novel Threshold Key Management Scheme Based on Bilinear Pairing without a Trusted Party in Mobile Ad Hoc Network
    Meng, Xianyong
    Li, Yangmin
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 73 - 77
  • [48] Timestamp-based Password Authentication Scheme
    Ismail, E. S.
    Syed-Musa, S. M. S.
    PROCEEDING OF THE 25TH NATIONAL SYMPOSIUM ON MATHEMATICAL SCIENCES (SKSM25): MATHEMATICAL SCIENCES AS THE CORE OF INTELLECTUAL EXCELLENCE, 2018, 1974
  • [49] A Trusted-based Cloud Computing Virtual Storage System and Key Technologies
    Wu, K. H.
    Chen, L.
    Li, Yi
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2015, 10 (04) : 579 - 592
  • [50] A new key management scheme for distributed encrypted storage systems
    Lee, Myungjin
    Bahn, Hyokyung
    Chae, Kijoon
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 1, 2006, 3980 : 1072 - 1079