计算机工程
計算機工程
계산궤공정
COMPUTER ENGINEERING
2013年
10期
6-9
,共4页
王拓%田松%崔伟宏
王拓%田鬆%崔偉宏
왕탁%전송%최위굉
可信云计算%门限远程证明%可信云群体%状态度量%双线性%临界可信阈值
可信雲計算%門限遠程證明%可信雲群體%狀態度量%雙線性%臨界可信閾值
가신운계산%문한원정증명%가신운군체%상태도량%쌍선성%림계가신역치
trusted cloud computing%threshold remote attestation%trusted cloud group%state metric%bilinearity%critical trusted threshold
现有可信云计算模式下的远程证明方案缺乏针对基础架构即服务环境下节点群体的可信研究,无法有效阻止不可信节点对外进行远程证明。为解决该问题,提出一种基于可信云计算平台的门限远程证明方案。采用可验证秘密分享算法和门限签名算法,实现云环境下可信群体中个体的远程证明,并对个体及其所在群体的运行状态进行评估以完成对个体的动态度量。在假设K 叛徒联合攻击计算问题难解的前提下,根据随机预言模型验证该方案可以有效阻止不可信节点的对外证明以及群体中不可信节点的合谋欺诈。选取不同的临界可信阈值和门限进行实验,结果表明,该方案的效率随着门限的增大和临界可信阈值的减小而增大。
現有可信雲計算模式下的遠程證明方案缺乏針對基礎架構即服務環境下節點群體的可信研究,無法有效阻止不可信節點對外進行遠程證明。為解決該問題,提齣一種基于可信雲計算平檯的門限遠程證明方案。採用可驗證祕密分享算法和門限籤名算法,實現雲環境下可信群體中箇體的遠程證明,併對箇體及其所在群體的運行狀態進行評估以完成對箇體的動態度量。在假設K 叛徒聯閤攻擊計算問題難解的前提下,根據隨機預言模型驗證該方案可以有效阻止不可信節點的對外證明以及群體中不可信節點的閤謀欺詐。選取不同的臨界可信閾值和門限進行實驗,結果錶明,該方案的效率隨著門限的增大和臨界可信閾值的減小而增大。
현유가신운계산모식하적원정증명방안결핍침대기출가구즉복무배경하절점군체적가신연구,무법유효조지불가신절점대외진행원정증명。위해결해문제,제출일충기우가신운계산평태적문한원정증명방안。채용가험증비밀분향산법화문한첨명산법,실현운배경하가신군체중개체적원정증명,병대개체급기소재군체적운행상태진행평고이완성대개체적동태도량。재가설K 반도연합공격계산문제난해적전제하,근거수궤예언모형험증해방안가이유효조지불가신절점적대외증명이급군체중불가신절점적합모기사。선취불동적림계가신역치화문한진행실험,결과표명,해방안적효솔수착문한적증대화림계가신역치적감소이증대。
Current remote attestation schemes for cloud computing lack researches on trusted node of Infrastructure as a Service(IaaS). They can not effectively prevent the attestation from untrusted nodes based on IaaS. To overcome these shortcomings, this paper puts forward a threshold remote attestation scheme based on Trusted Cloud Computing Platform(TCCP), which uses verifiable secret sharing algorithm and threshold signature algorithm to implement the remote attestation of trusted nodes in the cloud environment. It also can evaluate the running state of the node and the cluster to implement dynamic metrics for each node in the cluster. The scheme can prevent conspiracy attack and the remote attestation of untrusted nodes based on the assumption of the Collusion Attack Algorithm with K traitors (K-CAA) in the random oracle model. Different critical trusted threshold values are tested in the research. The results show that efficiency of the scheme increases with the threshold value increases and critical trusted threshold decreases.