Font Size: a A A

The Research On Attribute-based Remote Attestation Privacy Technology

Posted on:2014-01-27Degree:MasterType:Thesis
Country:ChinaCandidate:Y L ZhengFull Text:PDF
GTID:2248330398952128Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Recent years, with the rapid development of distributed technology, collaboration and sharing of heterogeneous subjects more frequently, sharing and collaboration of heterogeneous body needs to build on the basis of mutual trust, that the communication between heterogeneous body does not cause illegal use of resources or disclosure of sensitive information. Built on trusted computing platform remote attestation scheme is an effective solution to solve this problem is proposed trusted computing technology, also the main part of the trusted computing. Remote attestation process is not only need to create interactive mutual trust, but also to protect the party’s configuration information security, then the attribute-based remote attestation technology came into being, but through the analysis, attribute-based remote attestation certificate program does not fully protect the platform privacy, this article focuses on property-based remote attestation of privacy protection issues.Remote attestation mechanism lies in the core of credible evidence credible and evaluation, this paper first discusses the evidence credible assurance and metrics credible assurance, then propose a property-based remote attestation model, the model of privacy protection effect was in-depth research, discussion malicious verifier steal user privacy information of the three methods, namely single-attribute analysis, incremental comparative analysis, statistical analysis, in order to further raise privacy protection programs to provide guidance. Finally, from the two aspects of the property described in the Privacy remote attestation scheme AIK first discusses the identity key generation process, to design a new remote proof authentication method, the zero-knowledge proof, Kerberos framework and the Trusted Platform modules combine the method focuses on the platform information in remote attestation exposure. After proposes a technique based on hidden credentials remote attestation scheme that use hidden credentials in strategy and platform configuration information privacy protection advantages to improve the property-based remote attestation proving strategy and user configuration information and attribute the lack of protection.The present work have analyzed the AIK certificate generation protocol role in privacy protection, validated hidden credentials technology makes communication platform for the two sides do not send their configuration information and strategies under the premise proved the credibility of the platform, and proposed Hidden certificate programs to ensure privacy information to prove the safety of the process.
Keywords/Search Tags:Trusted Platform, Remote Attestation, Privacy Analysis, AIKGeneration Protocol, Cover Certificate Technology
PDF Full Text Request
Related items