A Novel Secure Terminal System Based on Trusted Hardware: U-Key
نویسندگان
چکیده
With the development of attack technique, new security problems have become more and more popular, traditional security means such as: firewall, IDS and so on expose to be limited, there is a basic consensus that solving the problem of information security is from terminal. Based on the deep analysis of the relation between the concept of “security” and “trusted” in computer system, this paper proposes a novel secure terminal system Based on trusted hardware: U-Key. It describes the architecture design of the whole secure system and analyses the important security function implemented. Moreover, the main performance overhead of system is analyzed. This paper gives illumination on how to take advantage of trusted hardware to enhance the security of terminal system
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملKISS: "Key It Simple and Secure" Corporate Key Management
Deploying a corporate key management system faces fundamental challenges, such as fine-grained key usage control and secure system administration. None of the current commercial systems (either based on software or hardware security modules) or research proposals adequately address both challenges with small and simple Trusted Computing Base (TCB). This paper presents a new key management archi...
متن کاملDynamic Policy Discovery with Remote Attestation
Remote attestation allows programs running on trusted hardware to prove their identity (and that of their environment) to programs on other hosts. Remote attestation can be used to address security concerns if programs agree on the meaning of data in attestations. This paper studies the enforcement of codeidentity based access control policies in a hostile distributed environment, using a combi...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملMutual Remote Attestation: Enabling System Cloning for TPM Based Platforms
We describe a concept of mutual remote attestation for two identically configured trusted (TPM based) systems. We provide a cryptographic protocol to achieve the goal of deriving a common session key for two systems that have verified each other to be a clone of themselves. The mutual attestation can be applied to backup procedures without providing data access to administrators, i. e. one trus...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JCP
دوره 4 شماره
صفحات -
تاریخ انتشار 2009