计算机科学 ›› 2024, Vol. 51 ›› Issue (6A): 230400088-6.doi: 10.11896/jsjkx.230400088

• 信息安全 • 上一篇    下一篇

基于可信隐式第三方的机载软件审计方法

岳猛1, 朱世博1, 洪雪婷2, 段冰艳1   

  1. 1 中国民航大学安全科学与工程学院 天津 300300
    2 中国民航大学电子信息与自动化学院 天津 300300
  • 发布日期:2024-06-06
  • 通讯作者: 岳猛(myue_23@163.com)
  • 基金资助:
    国家自然科学基金(62172418,U1933108,U2133203);天津市自然科学基金(21JCZDJC00830);天津市教委科研计划项目(2019KJ117)

Airborne Software Audit Method Based on Trusted Implicit Third Party

YUE Meng1, ZHU Shibo1, HONG Xueting2, DUAN Bingyan1   

  1. 1 School of Safety Science and Engineering,Civil Aviation University of China,Tianjin 300300,China
    2 School of Electronic Information and Automation,Civil Aviation University of China,Tianjin 300300,China
  • Published:2024-06-06
  • About author:YUE Meng,born in 1984,Ph.D,profe-ssor,is a member of CCF(No.39960S).His main research interests include aeronautical telecommunication network and data security.
  • Supported by:
    National Natural Science Foundation of China(62172418,U1933108 U2133203),Tianjin Natural Science Foundation(21JCZDJC00830) and Tianjin Education Commission Research Program Project(2019KJ117).

摘要: 分布式云存储技术为数量日益庞大的机载软件提供了新的分发与存储方式,这意味着航空公司失去了对软件的直接控制,因此机载软件安全成为了航空公司十分关注的问题。为了提高云存储环境下机载软件的安全性,提出了一种基于可信隐式第三方(Trusted Implicit Third Party,TITP)的机载软件审计方法对云上机载软件进行监控与管理,以确保机载软件的完整性。此外,由部署在云端的可信硬件代替用户进行审计工作,解决了可公开验证审计机制中第三方审计者不完全可信的问题,并以日志的方式记录审计结果以供用户查询。运用可信硬件进行完整性验证不仅降低了用户计算成本,而且缩短了用户在线时间。与其他可信隐式第三方审计方法进行实验对比,所提方法在审计计算过程中节省了10%的时间消耗。

关键词: 机载软件, 云存储, 可信隐式第三方, 审计方法, 日志

Abstract: The distributed cloud storage technology provides a new distribution and storage method for an increasingly large number of airborne software.This means that airlines have lost direct control over the software,therefore the security of airborne software has become one of the most concerned issue of airlines.In order to improve the security of airborne software in the cloud storage environment,an airborne software audit method based on trusted implicit third party is proposed.Trusted hardware deployed in the cloud is used to audit instead of users,which solves the problem that the third party auditor is not completely trusted in the publicly verifiable audit mechanism,and records the audit results in the form of logs for users to query,which not only reduces users’ computing costs,but reduces users’ online time.Compared with other trusted implicit third party audit methods,it saves 10% of the time consumption in the audit calculation process.

Key words: Airborne software, Cloud storage, Trusted implicit third party, Audit methods, Log

中图分类号: 

  • V328.3
[1]QUAN Y Q.Research on Architecture Design and Safety Ana-lysis of Avionics Architecture Databus Network for Commercial Aircraft[C]//Proceedings of 2018 3rd International Workshop on Materials Engineering and Computer Sciences(IWMECS 2018).2018:39-45.
[2]AMARNATH J,SURYA M,BHARGAV P,et al.Cloud com-puting in Aircraft Data Network[C]//2011 Integrated Communications,Navigation,and Surveillance Conference Proceedings.Herndon:IEEE Press,2011:E7-1-E7-8.
[3]LI W H,HAN C,ZHAO Y K,et al.Research on Architecture Designof Distributed Integrated Modular Avionics System[C]//Proceedings of the 9th China Aviation Society Youth Science and Technology Forum.Beijing:China Aviation Publishing & Media CO.,2020:971-977.
[4]LIU Y,JIN X,WEI X H.Design of System Management Fun-ction Based on Distributed Avionics System[J].Electronics Optics & Control,2022,29(9):74-77,95.
[5]FAN C,HAN Z,ZHAO L.Research on cloud storage Technology of Avionics System[J].Electronics Optics & Control,2022,29(3):69-74,80.
[6]ZHOU R,HE M X,CHEN Z M.Certificateless Public Auditing Scheme with Data Privacy Preserving for Cloud Storage[C]//2021 IEEE 6th International Conference on Cloud Computing and Big Data Analytics.Chengdu,China:IEEE,2021:675-682.
[7]LUO L P,SUN W.Exploration of Airborne Software Management Scheme for Airlines[J].Aviation Maintenance & Engineering,2016(9):110-111.
[8]Loadable Software Standards:Arinc Report 665-3[S].ARINC Airlines Electronic Engineering Committee,2005:6-26.
[9]信息安全技术 SM2 椭圆曲线公钥密码算法(第2部分):数字签名算法:GB/T 32918.2-2016[S].
[10]XIAO D,YANG L Y,SUN B,et al.Provable Data Possession System for Realistic Cloud Storage Environments[J].Journal of Software,2016,27(9):2400-2413.
[11]AN B Y,GONG Z,XIAO D,et al.Data possession audit with animplicit trusted third-party for cloud storage[J].Journal of Harbin Engineering University,2012,33(8):1039-1045.
[12]IBM.IBM 4764 PCI-X Cryptographic Coprocessor[EB/OL].[2011-05-15].http://www-03.Ibm.com/security/cryptocards/pcixcc/overperformance.Shtml.
[13]YANG L Y,SUN B,XIAO D,et al.Data Possession Auditing in with Near-Zero User-Side Overhead[C]//China Institute of Communications,Liaoning Provincial Communications Administration.Proceedings of the 10th Academic Annual Conference of the China Communications Society.National Defense Industry Press,2014:341-347.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!