Font Size: a A A

The Research On Application Of Remote Attestation In P2P Network

Posted on:2011-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:P ShenFull Text:PDF
GTID:2178360305955923Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Trusted Computing has been praised to be a new train of thought and a new out of way to solve the security problems for terminal end since it appeared, and it has been paid attention widely by scholars from home and abroad. Especially the application of Trusted Computing:Remote Attestation. It is used to provide the identity anonymous attestation and the integrity attestation for terminal end, because it can efficaciously solve the privacy protection problem between twe terminal ends accessing and the fallibility problems of terminal running environment, and so on. In the paper, we mainly center on the application research of Remote Attestaion in P2P Net, which is to solve the identity anonymous attestation between two peers accessing and the security attestation of terminal peer running environment.First, we understand the technology of trusted computing and remote attestation particularly and deeply, and know the main functions and applications of remote attestation. Simultaneously, we analysis the security of actual P2P Net, and intensively research the access control system of P2P Net, and point out the existent security problems of access control system.Then we bring to apply remote attestation techonoly into the P2P Net, and design a access control architecture of P2P based on remote attestation. Based on the integrity measure,integrity storage,integrity report which provided by Remote Attestation to implement the peer identity anonymous attestation and the peer integrity attestation in access controlling, which availably solves the security problems of P2P access control system.At last, we provide the implementation of the architecture. Based on the existing,perfect,usable technologies, design and set up the development platform for architecture, and provide the whole implementation on Linux system, and verify the feasibility of the architecture.
Keywords/Search Tags:Trusted Computing, Remote Attestation, Direct Anonymous Attestation, Integrity Attestation, P2P Net, Access Control
PDF Full Text Request
Related items