计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 48-52.doi: 10.11896/j.issn.1002-137X.2018.02.008

• 区块链技术 • 上一篇    下一篇

基于区块链的远程证明模型

刘明达,拾以娟   

  1. 江南计算技术研究所 江苏 无锡214083,江南计算技术研究所 江苏 无锡214083
  • 出版日期:2018-02-15 发布日期:2018-11-13
  • 基金资助:
    本文受国家科技重点专项“核高基”(2013ZX01029002-001)资助

Remote Attestation Model Based on Blockchain

LIU Ming-da and SHI Yi-juan   

  • Online:2018-02-15 Published:2018-11-13

摘要: 远程证明是构建可信网络的核心。但是,当前的远程证明模型仅面向有中心的网络,存在网关中心化、决策单点化的问题,并不适用于去中心的场景。针对去中心分布式网络环境中计算节点无法进行远程证明的问题,借鉴区块链的思想,提出了一种基于区块链的远程证明模型(Remote Attestation Based on blockchain,RABBC),并重点描述了模型框架、区块链核心结构和协议过程。分析表明,RABBC具有去中心化、可追溯、匿名、不可篡改的安全特性,并具备较高的效率。

关键词: 区块链,远程证明,去中心化,可信网络

Abstract: Remote attestation is the core of constructing the trusted network.However,current remote attestation modelonly looks on centralized network,in which there are some problems,such as centralized gateway and decision by single point,causing that it is not suitable to use this model in decentralized situation.Aiming at the problem that the computing node cannot execute remote attestation in the environment of centralized distributed network,by drawing lessons from the thought of blockchain,this paper proposed a remote attestation model based on blockchain (RABBC),and focused on model frame,core structure of blockchain and protocol process.The analysis shows that RABBC has the safe characteristics of decentralization,traceability,anonymity,non-tampering,and it is efficient.

Key words: Blockchain,Remote attestation,Decentralization,Trusted network

[1] ZHANG H G,HAN W B,LAI X J,et al.Survey on cyberspace security[J].Science China(Information Sciences),2016,6(2): 125-164.(in Chinese) 张焕国,韩文报,来学嘉,等.网络空间安全综述[J].中国科学(信息科学),2016,46(2):125-164.
[2] PEARSON S.Trusted Computing Platforms:TCPA Technology in Context[M].Prentice Hall PTR,2003:206-208.
[3] 张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:23-25.
[4] HAYES B.Cloud computing[J].Communications of the Acm,2008,51(7):9-11.
[5] GUBBI J,BUYYA R,MARUSIC S,et al.Internet of Things(IoT):A Vision,Architectural Elements,and Future Directions[J].Future Generation Computer Systems,2013,29(7):1645-1660.
[6] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[7] SHI W S,SUN H,CAO J,et al.Edge Computing-An Emerging Computing Model for Internet of Everything Era[J].Journal of Computer Research and Development,2017,54(5):907-924.(in Chinese) 施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924.
[8] XU R,GUO J,DENG L.A database security gateway to the detection of SQL attacks[C]∥International Conference on Advanced Computer Theory and Engineering.IEEE,2010:537-540.
[9] MURRAY A T,MATISZIW T C,GRUBESIC T H.A Methodo-logical Overview of Network Vulnerability Analysis[J].Growth &Change,2008,39(4):573-592.
[10] CHADWICK D W,BASDEN A.Evaluating Trust in a PublicKey Certification Authority[J].Computers & Security,2001,20(7):592-611.
[11] BRICKELL E,CAMENISCH J,CHEN L.Direct anonymous attestation[C]∥ACM Conference on Computer and Communications Security.ACM,2004:132-145.
[12] ZOHAR A.Bitcoin[J].Communications of the Acm,2015,58(9):104-113.
[13] Ethereum[EB/OL].https://www.ethereum.org.
[14] LI W,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain,Cryptocurrencies and Contracts.ACM,2017:9-14.
[15] UNDERWOOD S.Blockchain Beyond Bitcoin[J].Communications of the Acm,2016,9(11):15-17.
[16] HE P,YU G,ZHANG Y F,et al.Surveyon Blockchain Techno-logy and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[17] DPoS[EB/OL].http://8btc.com/article-3759-1.html.
[18] Bitshares[EB/OL].http://www.btsabc.org.
[19] DOLEV D,YAO A.On the Security of Public Key Protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.
[20] ZHU L H,GAO F,SHEN M,et al.Survey of block chain privacy protection[J].Journal of Computer Research and Development,2017,4(10):2170-2186.(in Chinese) 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,4(10):2170-2186.
[21] LIN C,PENG X H.Research on trusted network[J].Chinese Journal of Computers,2005,28(5):751-758.(in Chinese) 林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!