首页 | 本学科首页   官方微博 | 高级检索  
     


A Peer-to-Peer resource sharing scheme using trusted computing technology
Authors:Lu Chen  Huanguo Zhang  Liqiang Zhang  Song Li  Liang Cai
Affiliation:[1]School of Computer, Wuhan University/Key Laboratory ofAerospace Information Security and Trusted Computing of Ministryof Education, Wuhan 430072, Hubei, China; [2]State Key Laboratory of Software Engineering, WuhanUniversity, Wuhan 430072, Hubei, China [3]Department of Information Security, Information EngineeringUniversity, Zhengzhou 450004, Henan, China
Abstract:Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform. Foundation item: Supported by the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006) and the National High Technology Research and Development Program of China (2006AA01Z442, 2007AA01Z411)
Keywords:resource sharing  trusted computing  virtualization  UCON (usage control)  chain of trust
本文献已被 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号