On privacy of property-based remote attestation
Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process, protecting the privacy of participating parties is one...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2009-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails?columnId=74649758&Fpath=home&index=0 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850212662727671808 |
|---|---|
| author | LI Shang-jie1 HE Ye-ping1 LIU Dong-mei1 YUAN Chun-yang3 |
| author_facet | LI Shang-jie1 HE Ye-ping1 LIU Dong-mei1 YUAN Chun-yang3 |
| author_sort | LI Shang-jie1 |
| collection | DOAJ |
| description | Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process, protecting the privacy of participating parties is one of the necessary conditions that remote attestation is widely accepted by stake-holders.Property-based attestation is proposed and a widely accepted scheme for this purpose.However, property-based attestation doesn’t intrinsically preserve the configuration privacy of attestation platform.In fact, the capability of protecting privacy is relevant to the construction of property-based attestation and the measure-ments that the adversary can take to compromise such protection.Three possible measurements were presented that a ma-licious verifier could take to analyze the configuration privacy of the attestation platform.And then the characteristics and limitations of these methods were discussed, which offered reference for the further research on property-based remote attestation. |
| format | Article |
| id | doaj-art-e8e9e12f635b483596adebac4f9a3bb1 |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2009-01-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-e8e9e12f635b483596adebac4f9a3bb12025-08-20T02:09:17ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-013014615274649758On privacy of property-based remote attestationLI Shang-jie1HE Ye-ping1LIU Dong-mei1YUAN Chun-yang3Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process, protecting the privacy of participating parties is one of the necessary conditions that remote attestation is widely accepted by stake-holders.Property-based attestation is proposed and a widely accepted scheme for this purpose.However, property-based attestation doesn’t intrinsically preserve the configuration privacy of attestation platform.In fact, the capability of protecting privacy is relevant to the construction of property-based attestation and the measure-ments that the adversary can take to compromise such protection.Three possible measurements were presented that a ma-licious verifier could take to analyze the configuration privacy of the attestation platform.And then the characteristics and limitations of these methods were discussed, which offered reference for the further research on property-based remote attestation.http://www.joconline.com.cn/thesisDetails?columnId=74649758&Fpath=home&index=0trusted computing;platform attestation;property-based attestation;configuration privacy;privacy analysis |
| spellingShingle | LI Shang-jie1 HE Ye-ping1 LIU Dong-mei1 YUAN Chun-yang3 On privacy of property-based remote attestation Tongxin xuebao trusted computing;platform attestation;property-based attestation;configuration privacy;privacy analysis |
| title | On privacy of property-based remote attestation |
| title_full | On privacy of property-based remote attestation |
| title_fullStr | On privacy of property-based remote attestation |
| title_full_unstemmed | On privacy of property-based remote attestation |
| title_short | On privacy of property-based remote attestation |
| title_sort | on privacy of property based remote attestation |
| topic | trusted computing;platform attestation;property-based attestation;configuration privacy;privacy analysis |
| url | http://www.joconline.com.cn/thesisDetails?columnId=74649758&Fpath=home&index=0 |
| work_keys_str_mv | AT lishangjie1 onprivacyofpropertybasedremoteattestation AT heyeping1 onprivacyofpropertybasedremoteattestation AT liudongmei1 onprivacyofpropertybasedremoteattestation AT yuanchunyang3 onprivacyofpropertybasedremoteattestation |