期刊文献+

基于可信计算的车联网云用户远程证明 被引量:1

Remote attestation for vehicular cloud based on trusted computing
原文传递
导出
摘要 为了防止恶意用户对车联网云平台进行欺骗,提出通过远程证明对用户属性和可信平台状态进行验证的方案.一方面,采用模糊属性签名方案可以确保终端的匿名性,避免用户身份及隐私信息泄露;另一方面,采用本方案可利用终端的可信模块及可信链传递机制,从而确保硬件、固件及软件的可信性和时效性.此外,在远程证明方案中,向车联网云平台的管理模块申请前用户先提供其行为预测方程,并且云管理模块将一段时间后的行为特征值组与预测方程进行比对,由此确定用户运行程序的动态可信性.采用该方案可有效实现对车联网云用户的远程证明. In order to prevent malicious users to deceive,the remote attestation scheme was proposed by validating user′s attributes and platform status.On one hand,the scheme can ensure anonymity of the terminal platform,which avoid the user′s identity and privacy information leakage.On the other hand,the scheme can make full use of the trusted platform control module and the trusted chain,to verify the hardware and firmware of the terminal and to verify reliability and efficiency of the software.In addition,user′s prediction equation on behavior firstly was provided,which applied to vehicular cloud(VC)management module,and then the management module would compare user′s real behavior and the prediction equation to get user′s plausibility in the dynamic environment.The scheme realizes the user′s remote attestation on VC efficiently.
出处 《华中科技大学学报(自然科学版)》 EI CAS CSCD 北大核心 2016年第3期12-16,共5页 Journal of Huazhong University of Science and Technology(Natural Science Edition)
基金 高等学校博士学科点专项科研基金资助项目(20131103120001) 可信计算北京市重点实验室基金资助项目(BZ0050) 可信计算北京市重点实验室开放课题基金资助项目(BZ0050) 国家高技术研究发展计划资助项目(2015AA016002)
关键词 可信计算 可信平台 远程证明 可信车联网云 车联网云计算 trusted computing trusted platform remote attestation trusted vehicular clouds vehicular cloud computing
  • 相关文献

参考文献12

  • 1Abuelela M, Olariu S. Taking vanet to the clouds [C] // Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia MoMM. New York: ACM, 2010: 6-13.
  • 2Eltoweissy M, Olariu S, Younis M. Towards auton- omous vehicular clouds[C]//Proceedings of Ad Hoc Nets Victoria. Berlin: Springer, 2010: 1-16.
  • 3Olariu S, Khalil I, Abuelela M. Taking vanet to the clouds[J]. International Journal of Pervasive Compu- ting and Communication, 2011, 7(1): 7-21.
  • 4Whaiduzzaman M, Sookhak M, Gani A, et al. A sur- vey on vehicular cloud computing [J]. Journal of Network and Computer Applications, 2014, 40 : 325- 344.
  • 5Yan G, Rawat D B, Bista B B. Towards secure ve- hicular clouds[C]//Proc of International Conference on Complex, Intelligent and Software Intensive Sys- tems. Washington~ IEEE, 2012: 370-375.
  • 6Yan G, Wen D, Olariu S, et al. Security challenges in vehicular cloud computing[J]. IEEE Transactions on Intelligent Transportation Systems~ 2013, 14(1) :284-294.
  • 7吴静,刘衍珩,王健,李伟平.车载自组网的可信认证与信任评估框架[J].通信学报,2009,30(S1):107-113. 被引量:9
  • 8张文博,包振山,李健.基于可信计算的车联网云安全模型[J].武汉大学学报(理学版),2013,59(5):438-442. 被引量:6
  • 9张文博,包振山,李健,詹静.基于可信计算的车联网云安全通信模型[J].华中科技大学学报(自然科学版),2014,42(11):102-105. 被引量:5
  • 10Sadeghi A, Stable C. Property-based attestation for computing platforms: caring about properties, not mechanisms[C]//Proc of Annual Computer Security Applications Conference. Tucson: Arizona, 2004: 67-77.

二级参考文献36

  • 1吴静,刘衍珩,王健,李伟平.车载自组网的可信认证与信任评估框架[J].通信学报,2009,30(S1):107-113. 被引量:9
  • 2SIEWIOREK Daniel P.,杨孝宗,CHILLAREGE Ram,KALBARCZYK Zbigniew T..可信计算的产业趋势和研究(英文)[J].计算机学报,2007,30(10):1645-1661. 被引量:9
  • 3Abuelela M, Olariu S. Taking VANET to the clouds [C]//Proceedings of The 8th International Confer- ence on Advances in Mobile Computing and Multime- dia MoMM,New York: ACM, 2010: 6-13.
  • 4Eltoweissy M, Olariu S, Younis M. Towards autono- mous vehicular elouds[C]// Proceedings of Ad Hoc- Nets Victoria, Berlin Heidelberg: Springer-Verlag, 2010:1-16.
  • 5Olariu S, Khalil I, Abuelela M. Taking VANET to the clouds [J]. International Journal of Pervasive Computing and Communication, 2011, 7(1) : 7-21.
  • 6Santos N, Gummadi K P, Rodrigues R. Towards trusted cloud computing[DB/OL]. [2013-02-02]. ht- tp ://www. mpi-sws, org/- gummadi/ papers/trusted _cloud. pd f.
  • 7Krautheim F J. Private virtual infrastructure for cloud computing [ DB/OL ]. [ 2013-03-02 ]. http ://static. usenix, org/event/hotcloudOg/tech/ full _ papers/ krautheim, pd f .
  • 8Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: exploring information leak- age in third-party compute clouds [C]//Proceedings of the 16th ACM conference on Computer and commu- nications security, New York:ACM, 2009 : 199-212.
  • 9Li X Y, Zhou L T, Shi Y,et al. A trusted computing environment model in cloud architecture [DB/OL]. [ 2013-03-13 ]. http://ieeexplore, ieee. org/stamp/ stamp, jsp? tp= &arnumber= 5580769.
  • 10Yan G, Rawat D B, Bista B B. Towards secure vehic- ular clouds [DB/OL]. [2013-02-23]. http://ieeex- plore, ieee. org/stamp/stamp, jsp? arnumber = 06245610.

共引文献30

同被引文献4

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部