Computer Science ›› 2024, Vol. 51 ›› Issue (6A): 230400088-6.doi: 10.11896/jsjkx.230400088

• Information Security • Previous Articles     Next Articles

Airborne Software Audit Method Based on Trusted Implicit Third Party

YUE Meng1, ZHU Shibo1, HONG Xueting2, DUAN Bingyan1   

  1. 1 School of Safety Science and Engineering,Civil Aviation University of China,Tianjin 300300,China
    2 School of Electronic Information and Automation,Civil Aviation University of China,Tianjin 300300,China
  • Published:2024-06-06
  • About author:YUE Meng,born in 1984,Ph.D,profe-ssor,is a member of CCF(No.39960S).His main research interests include aeronautical telecommunication network and data security.
  • Supported by:
    National Natural Science Foundation of China(62172418,U1933108 U2133203),Tianjin Natural Science Foundation(21JCZDJC00830) and Tianjin Education Commission Research Program Project(2019KJ117).

Abstract: The distributed cloud storage technology provides a new distribution and storage method for an increasingly large number of airborne software.This means that airlines have lost direct control over the software,therefore the security of airborne software has become one of the most concerned issue of airlines.In order to improve the security of airborne software in the cloud storage environment,an airborne software audit method based on trusted implicit third party is proposed.Trusted hardware deployed in the cloud is used to audit instead of users,which solves the problem that the third party auditor is not completely trusted in the publicly verifiable audit mechanism,and records the audit results in the form of logs for users to query,which not only reduces users’ computing costs,but reduces users’ online time.Compared with other trusted implicit third party audit methods,it saves 10% of the time consumption in the audit calculation process.

Key words: Airborne software, Cloud storage, Trusted implicit third party, Audit methods, Log

CLC Number: 

  • V328.3
[1]QUAN Y Q.Research on Architecture Design and Safety Ana-lysis of Avionics Architecture Databus Network for Commercial Aircraft[C]//Proceedings of 2018 3rd International Workshop on Materials Engineering and Computer Sciences(IWMECS 2018).2018:39-45.
[2]AMARNATH J,SURYA M,BHARGAV P,et al.Cloud com-puting in Aircraft Data Network[C]//2011 Integrated Communications,Navigation,and Surveillance Conference Proceedings.Herndon:IEEE Press,2011:E7-1-E7-8.
[3]LI W H,HAN C,ZHAO Y K,et al.Research on Architecture Designof Distributed Integrated Modular Avionics System[C]//Proceedings of the 9th China Aviation Society Youth Science and Technology Forum.Beijing:China Aviation Publishing & Media CO.,2020:971-977.
[4]LIU Y,JIN X,WEI X H.Design of System Management Fun-ction Based on Distributed Avionics System[J].Electronics Optics & Control,2022,29(9):74-77,95.
[5]FAN C,HAN Z,ZHAO L.Research on cloud storage Technology of Avionics System[J].Electronics Optics & Control,2022,29(3):69-74,80.
[6]ZHOU R,HE M X,CHEN Z M.Certificateless Public Auditing Scheme with Data Privacy Preserving for Cloud Storage[C]//2021 IEEE 6th International Conference on Cloud Computing and Big Data Analytics.Chengdu,China:IEEE,2021:675-682.
[7]LUO L P,SUN W.Exploration of Airborne Software Management Scheme for Airlines[J].Aviation Maintenance & Engineering,2016(9):110-111.
[8]Loadable Software Standards:Arinc Report 665-3[S].ARINC Airlines Electronic Engineering Committee,2005:6-26.
[9]信息安全技术 SM2 椭圆曲线公钥密码算法(第2部分):数字签名算法:GB/T 32918.2-2016[S].
[10]XIAO D,YANG L Y,SUN B,et al.Provable Data Possession System for Realistic Cloud Storage Environments[J].Journal of Software,2016,27(9):2400-2413.
[11]AN B Y,GONG Z,XIAO D,et al.Data possession audit with animplicit trusted third-party for cloud storage[J].Journal of Harbin Engineering University,2012,33(8):1039-1045.
[12]IBM.IBM 4764 PCI-X Cryptographic Coprocessor[EB/OL].[2011-05-15].http://www-03.Ibm.com/security/cryptocards/pcixcc/overperformance.Shtml.
[13]YANG L Y,SUN B,XIAO D,et al.Data Possession Auditing in with Near-Zero User-Side Overhead[C]//China Institute of Communications,Liaoning Provincial Communications Administration.Proceedings of the 10th Academic Annual Conference of the China Communications Society.National Defense Industry Press,2014:341-347.
[1] GUI Haitao, WANG Zhongqing. Personalized Dialogue Response Generation Combined with Conversation State Information [J]. Computer Science, 2024, 51(6A): 230800055-7.
[2] LU Dongsheng, LONG Hua. Method for Homologous Spectrum Monitoring Data Identification Based on Spectrum SIFT [J]. Computer Science, 2024, 51(6A): 230300177-7.
[3] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[4] LIANG Meiyan, FAN Yingying, WANG Lin. Fine-grained Colon Pathology Images Classification Based on Heterogeneous Ensemble Learningwith Multi-distance Measures [J]. Computer Science, 2024, 51(6A): 230400043-7.
[5] LAI Xin, LI Sining, LIANG Changsheng, ZHANG Hengyan. Ontology-driven Study on Information Structuring of Aeronautical Information Tables [J]. Computer Science, 2024, 51(6A): 230800150-7.
[6] CHEN Sishuo, WANG Xiaodong, LIU Xiyang. Survey of Breast Cancer Pathological Image Analysis Methods Based on Graph Neural Networks [J]. Computer Science, 2024, 51(6): 172-185.
[7] LAN Yongqi, HE Xingxing, LI Yingfang, LI Tianrui. New Graph Reduction Representation and Graph Neural Network Model for Premise Selection [J]. Computer Science, 2024, 51(5): 193-199.
[8] LIU Jun, RUAN Tong, ZHANG Huanhuan. Prompt Learning-based Generative Approach Towards Medical Dialogue Understanding [J]. Computer Science, 2024, 51(5): 258-266.
[9] LI Panpan, WU Hao, LIU Jiajia, DUAN Li, LU Yunlong. Overview of Security Technologies and Strategies for Intelligent Railway 5G [J]. Computer Science, 2024, 51(5): 1-11.
[10] SHANG Yuling, LI Peng, ZHU Feng, WANG Ruchuan. Overview of IoT Traffic Attack Detection Technology Based on Fuzzy Logic [J]. Computer Science, 2024, 51(3): 3-13.
[11] YAN Jiahe, LI Honghui, MA Ying, LIU Zhen, ZHANG Dalin, JIANG Zhouxian, DUAN Yuhang. Multi-source Heterogeneous Data Fusion Technologies and Government Big Data GovernanceSystem [J]. Computer Science, 2024, 51(2): 1-14.
[12] GUO Shangzhi, LIAO Xiaofeng, XIAN Kaiyi. Logical Regression Click Prediction Algorithm Based on Combination Structure [J]. Computer Science, 2024, 51(2): 73-78.
[13] ZANG Hui, HE Xingxing, WANG Chenglong, LI Yingfang, LI Tianrui. Construction and Compounding of a Class of Regular Standard Contradictions in Propositional Logic [J]. Computer Science, 2024, 51(1): 295-300.
[14] WANG Yi, HU Xuexian, WEI Jianghong. Two-factor Authentication Scheme for Blind Cloud Storage System Based on Password and SmartCard [J]. Computer Science, 2024, 51(1): 363-370.
[15] ZHOU Xuequan, DU Nisuo, OUYANG Zhi. Chaos COOT Bird Algorithm Based on Cauchy Mutation and Differential Evolution [J]. Computer Science, 2023, 50(8): 209-220.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!