Computer Science ›› 2018, Vol. 45 ›› Issue (4): 148-151.doi: 10.11896/j.issn.1002-137X.2018.04.024

Previous Articles     Next Articles

Remote Attestation Mechanism Based on Locality Principle

XIA Qing-xun and ZHUANG Yi   

  • Online:2018-04-15 Published:2018-05-11

Abstract: In order to improve the efficiency of the remote configuration attestation scheme,combining the locality principle of the program with the storage structure of Merkle Hash tree,the data structure used to store the Hash values of the program module integrity was improved,and a remote proof mechanism based on locality principle was proposed.Experiments show that the new mechanism can improve the efficiency of the remote configuration attestation by redu-cing the consumption of constructing stored measurement logs and shortening the length of authentication paths.

Key words: Trusted computing,Remote attestation,Merkle Hash tree,Locality principle

[1] Trusted Computing Group(TCG).
[2] ASOKAN N,EKBERG J E,KOSTIAINEN K,et al.MobileTrusted Computing[J].Proceedings of the IEEE,2014,102(8):1189-1206.
[3] FUGINI M G,BREVEGLIERI L,PELOSI G,et al.TrustedComputing for Embedded Systems.
[4] MU Y.Zhong Guan Cun Trusted Computing Industry Alliancewas Established[J].Information Security and Communications Privacy,2014(5):16.(in Chinese) 木易.中关村可信计算产业联盟成立[J].信息安全与通信保密,2014(5):16.
[5] SONG X L,ZHANG L H,CHEN D Y.Preventing Hypervisor-based Rootkit with Trusted Execution Technology[J].Information Security & Communications Privacy,2009,7:76-81.
[6] YU A,ZHAO S.Enhancing Flexibility of TCG’s TNC through Layered Property Attestation[C]∥IEEE International Confe-rence on Trust,Security and Privacy in Computing and Communications.IEEE Computer Society,2011:751-756.
[7] ARTHUR W,CHALLENER D,GOLDMAN K.Platform Configuration Registers[M]∥A Practical Guide to TPM 2.0.Apress,,Berkeley,CA,2015.
[8] SAILER R,ZHANG X,JAEGER T,et al.Design and imple-mentation of a TCG-based integrity measurement architecture[C]∥Usenix Security Symposium.San Diego,CA,USA,2004:16-16.
[9] JAEGER T,SAILER R,SHANKAR U.PRIMA:policy-reduced integrity measurement architecture[C]∥SACMAT 2006,ACM Symposium on Access Control MODELS and Technologies.Lake Tahoe,California,USA,2006:19-28.
[10] CAMENISCH J,CHEN L,DrRJVERS M,et al.One TPM to Bind Them All:Fixing TPM 2.0 for Provably Secure Anonymous Attestation[C]∥Security and Privacy.IEEE,2017:901-920.
[11] XU Z Y,HE Y P,DENG L L.Efficient Remote AttestationMechanism with Privacy Protection[J].Journal of Software,2011,22(2):339-352.(in Chinese) 徐梓耀,贺也平,邓灵莉.一种保护隐私的高效远程验证机制[J].软件学报,2011,22(2):339-352.
[12] ZHU Y,LI Q B,ZHONG C L,et al.Non-balanced Binary Hash-tree Model for Fine-grained Integrity Measurement[J].Journal of Chinese Computer Systems,2014,35(7):1604-1609.(in Chinese) 朱毅,李清宝,钟春丽,等.用于细粒度完整性度量的非平衡二叉哈希树模型[J].小型微型计算机系统,2014,35(7):1604-1609.
[13] FU D,PENG X,YANG Y.Unbalanced tree-formed verification data for trusted platforms[J].Security & Communication Networks,2016,9(7):622-633.
[14] DENNING P J.The Locality Principle[J].Communications of the Acm,2005,48(7):19-24.

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .