Computer Science ›› 2018, Vol. 45 ›› Issue (2): 48-52.doi: 10.11896/j.issn.1002-137X.2018.02.008

Previous Articles     Next Articles

Remote Attestation Model Based on Blockchain

LIU Ming-da and SHI Yi-juan   

  • Online:2018-02-15 Published:2018-11-13

Abstract: Remote attestation is the core of constructing the trusted network.However,current remote attestation modelonly looks on centralized network,in which there are some problems,such as centralized gateway and decision by single point,causing that it is not suitable to use this model in decentralized situation.Aiming at the problem that the computing node cannot execute remote attestation in the environment of centralized distributed network,by drawing lessons from the thought of blockchain,this paper proposed a remote attestation model based on blockchain (RABBC),and focused on model frame,core structure of blockchain and protocol process.The analysis shows that RABBC has the safe characteristics of decentralization,traceability,anonymity,non-tampering,and it is efficient.

Key words: Blockchain,Remote attestation,Decentralization,Trusted network

[1] ZHANG H G,HAN W B,LAI X J,et al.Survey on cyberspace security[J].Science China(Information Sciences),2016,6(2): 125-164.(in Chinese) 张焕国,韩文报,来学嘉,等.网络空间安全综述[J].中国科学(信息科学),2016,46(2):125-164.
[2] PEARSON S.Trusted Computing Platforms:TCPA Technology in Context[M].Prentice Hall PTR,2003:206-208.
[3] 张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:23-25.
[4] HAYES B.Cloud computing[J].Communications of the Acm,2008,51(7):9-11.
[5] GUBBI J,BUYYA R,MARUSIC S,et al.Internet of Things(IoT):A Vision,Architectural Elements,and Future Directions[J].Future Generation Computer Systems,2013,29(7):1645-1660.
[6] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.
[7] SHI W S,SUN H,CAO J,et al.Edge Computing-An Emerging Computing Model for Internet of Everything Era[J].Journal of Computer Research and Development,2017,54(5):907-924.(in Chinese) 施巍松,孙辉,曹杰,等.边缘计算:万物互联时代新型计算模型[J].计算机研究与发展,2017,54(5):907-924.
[8] XU R,GUO J,DENG L.A database security gateway to the detection of SQL attacks[C]∥International Conference on Advanced Computer Theory and Engineering.IEEE,2010:537-540.
[9] MURRAY A T,MATISZIW T C,GRUBESIC T H.A Methodo-logical Overview of Network Vulnerability Analysis[J].Growth &Change,2008,39(4):573-592.
[10] CHADWICK D W,BASDEN A.Evaluating Trust in a PublicKey Certification Authority[J].Computers & Security,2001,20(7):592-611.
[11] BRICKELL E,CAMENISCH J,CHEN L.Direct anonymous attestation[C]∥ACM Conference on Computer and Communications Security.ACM,2004:132-145.
[12] ZOHAR A.Bitcoin[J].Communications of the Acm,2015,58(9):104-113.
[13] Ethereum[EB/OL].
[14] LI W,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain,Cryptocurrencies and Contracts.ACM,2017:9-14.
[15] UNDERWOOD S.Blockchain Beyond Bitcoin[J].Communications of the Acm,2016,9(11):15-17.
[16] HE P,YU G,ZHANG Y F,et al.Surveyon Blockchain Techno-logy and Its Application Prospect[J].Computer Science,2017,44(4):1-7.(in Chinese) 何蒲,于戈,张岩峰,等.区块链技术与应用前瞻综述[J].计算机科学,2017,44(4):1-7.
[17] DPoS[EB/OL].
[18] Bitshares[EB/OL].
[19] DOLEV D,YAO A.On the Security of Public Key Protocols[J].IEEE Transactions on Information Theory,1983,29(2):198-208.
[20] ZHU L H,GAO F,SHEN M,et al.Survey of block chain privacy protection[J].Journal of Computer Research and Development,2017,4(10):2170-2186.(in Chinese) 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,4(10):2170-2186.
[21] LIN C,PENG X H.Research on trusted network[J].Chinese Journal of Computers,2005,28(5):751-758.(in Chinese) 林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758.

No related articles found!
Full text



No Suggested Reading articles found!