Font Size: a A A

Research On Sharing Of Network Resources Based On Trusted Platform

Posted on:2011-07-10Degree:MasterType:Thesis
Country:ChinaCandidate:A G AnFull Text:PDF
GTID:2178360308954087Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet, sharing network resources has become a main form for working, studying, living, and entertainment. However, many of insecurity factor of network architecture constrains the normal development of the network resource sharing. Future trends of network entity didn't forecast, Trusted of platform didn't certification, and authentication, security of data cannot guarantee in the transmission process.The network resources based on trusted platform sharing is discussed by the three parts. The least square method is quoted, through the historical rate of the network entity, three fitting curve equation of entity is formed, trusted of the next time point is calculated based on curve equation, future trends is to judge; The trusted domain is constructs containing common PC client and authentication server. The domain authentication server is a trusted computer, the authentication servers authenticate each other based on remote attestation of the system's behavior, using TPM as root of trust, verification system startup process is credible, the system behavior of the operating system changing the system state is measure, determine the trust of the state of the system; The component properties domain members is provide to the authentication server, when the proposed component attribute requirements proposed by authentication server is a subset of component properties of domain member, the domain members is considered credible, the member of domain apply trust token before sharing network resource , the authentication server make a trust a token that include trusted of the next time and future trend, the member of domain request net work resource carrying the trust token ,the provider of resource verify trust token of request based on security policy .When the requestor and provider are credibility each other , the sharing of network resource is starting .at last , they make a rate of Transaction.In the experimental analysis stage, evaluation data of eBay trading website is cited for forecasting behavior of the entity network, tracking sequence of boot of Linux and making a black and white lists based on system behavior , analysis of component-based properties to prove the feasibility of long-range, analysis of component-based properties to prove the feasibility of long-range, the feasibility of based component-based properties is analyzing , and finally analyzing advantages and efficiency of resource sharing adapting the comparative method based on trusted platform...
Keywords/Search Tags:trust, remote attestation, share, trust prediction, trust token
PDF Full Text Request
Related items