earticle

논문검색

Security and Trust

Towards a Practical and Scalable Trusted Software Dissemination System

원문정보

Deng Chuan, Yang Lin, Ma Linru, Cao Yuan

피인용수 : 0(자료제공 : 네이버학술정보)

초록

영어

Malware inside networks along with worms and viruses have become a critical concern. Even though several approaches have been proposed to eliminate this severe problem, the vulnerability of the software dissemination server’s platform is often underestimated. Trusted software dissemination based on trusted computing mutual remote attestation mechanisms is a new approach designed to overcome it. But the limited computational capabilities of the TPM device on the sever side is an obvious bottleneck to scalable performance. Without any changes being made to the traditional TPM, and simply by introducing a novel highly efficient remote attestation mechanism specifically tailored for the server platform, we greatly increase the scalability of the server platform. Experimental measurements shows that handling multiple, almost simultaneous, software download requests only increases the average response time by a constant increment, which shows great efficiency when compared to existing linear approaches. Shared key, dealt with by Bilinear-Pairing properties, is also included to protect the attestation session and disseminated software. Implementation details, security analysis and performance evaluation of our system architecture are presented to demonstrate that our approach is feasible for a practical and scalable trusted software dissemination system.

목차

Abstract
 I. INTRODUCTION
 II. RELATED WORK
 III. OVERVIEW OF TRUST SOFTWARE DISSEMINATION SYSTEM
 IV. A PRACTICAL AND SCALABLE DISSEMINATION PROTOCOL SOLUTION
  A. Notations and Preconditions
  B. Dissemination Protocol Based on Ring Buffer Attestation
 V. SECURITY ANALYSIS
  A. Implemental Security Analysis
  B. Theoretical Security Analysis
 VI. IMPLEMENTATION AND PERFORMANCE ANALYSIS
  A. Implementation
  B. Experimental Performance Analysis
  C. Theoretical Performance Analysis
 VII. CONCLUSION
 ACKNOWLEDGMENT
 REFERENCES

저자정보

  • Deng Chuan Institute of Communications Engineering PLAUST, Nanjing, China
  • Yang Lin Centre of Security IEESEC of China, Beijing, China
  • Ma Linru Centre of Security IEESEC of China, Beijing, China
  • Cao Yuan School of Computer Science NUDT, Changsha, Hunan, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.