Font Size: a A A

Research On Trustworthiness Evidence Collection Model Of Running Dynamic Environment Of Trusted Terminal

Posted on:2013-02-10Degree:MasterType:Thesis
Country:ChinaCandidate:J ChenFull Text:PDF
GTID:2248330377451106Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With regard to the phenomenon that people pay more and more attention to the terminal security, we found that use software to insulate external terminal threats can’t guarantee terminal’s safety. Firstly, the software which used to protect terminal is unreliability, because we can’t guarantee its own security. Secondly, these software only prevent external attack but Internal threats。So we need a reliable technology to protect the safety of the terminal In this paper, we choose trusted computing technology, it’s one of the most effective methods to solve this problem.Chain measurement mechanism of trusted computing can guarantee the credible of terminal from boot to operate the system, but it doesn’t easily extend to all applications in the terminal, so it is difficult for the terminal to always maintenance trust of the dynamic running environment of the terminal.To collect trustworthiness evidence in an objective, genuine and comprehensive way, this paper proposes a trustworthiness evidence collection mechanism of trusted terminal running dynamic environment. Firstly, a trusted evidence collection agent, whose static and dynamic creditability is assured by the measurement function of trusted platform module (TPM) and isolation mechanism of trusted virtual machine monitor (TVMM), is introduced by an application system in the terminal. And then the agent collects the information of the terminal dynamic running environment including memory, process, cpu, port of net, disk files, configure data and so on, and all collected information is saved by the storage function of TPM, moreover, the creditability of those collected information is assured by TPM too. This mechanism has good scalability to support various trustworthiness evaluation models. This paper also implements a prototype of the agent in Windows platform. Based on the prototype, we study the trustworthiness evaluation for executing the agent program in a local area network distributed computing environment. In this application, the performance of prototype is studied, and the feasibility of this approach is demonstrated.
Keywords/Search Tags:TPM(trusted platform module), running environment, trustworthiness evidence, trusted terminal agent
PDF Full Text Request
Related items