Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 240200109-6.doi: 10.11896/jsjkx.240200109

• Interdiscipline & Application • Previous Articles     Next Articles

Study on Trust Evaluation System Based on Trusted Platform Control Module

HUANG Jianhui1,2, ZHANG Jiangjiang1,2, SHEN Changxiang1,2, ZHANG Jianbiao1,2, WANG liang3   

  1. 1 Faculty of Information Technology,Beijing University of Technology,Beijing 100124,China
    2 Beijing Key Laboratory of Tusted Computing,Beijing 100124,China3 Shanghai Suanshi Technology CO.,LTD,Shanghai 201203,China
  • Online:2024-11-16 Published:2024-11-13
  • About author:HUANG Jianhui,born in 1979,Ph.D.His main research interests include cyberspace security and trusted computing.
    ZHANG Jiangjiang,born in 1994,Ph.D.His main research interests include cyberspace security and big data mode-ling.
  • Supported by:
    Natural Science Foundation of Beijing,China(M21039).

Abstract: The existing trust assessment is based on computer software scanning or trust modules that are achieved through local reporting or remote network authentication,which solves the trust measurement guarantee for the construction process and running status of the local execution environment.However,from the perspective of network applications,there are still systemic security risks.This paper proposes a network node trust evaluation method that adds implementation within the trusted platform control module(TPCM) to address this issue.This method achieves a fast and reliable trust evaluation system under a dual architecture(computing+defense) through the TPCM of defense units,and the evaluated trust values are stored and maintained through TPCM.This scheme not only avoids device forgery after being attacked,but also frees up CPU computing resources.This paper studies a network node trust evaluation system based on TPCM support to achieve a systematic evaluation of the cre-dibility of lightweight computer network platform nodes,ensuring the safe and reliable operation of the network.

Key words: TPCM, Trust evaluation, Safe and trust, Dynamic measurement, Trusted computing 3.0

CLC Number: 

  • TP393
[1]ALWARAFY A,AL-THELAYA K A,ABDALLAH M,et al.A survey on security and privacy issues in edge-computing-assisted internet of things[J].IEEE Internet of Things Journal,2020,8(6):4004-4022.
[2]LIU L,MA Z,MENG W.Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks[J].Future Generation Computer Systems,2019,101:865-879.
[3]SOUISSI I,AZZOUNA N B,SAID L B.A multi-level study ofinformation trust models in WSN-assisted IoT[J].Computer Networks,2019,151:12-30.
[4]HE Y,YU F R,WEI Z,et al.Trust management for secure cognitive radio vehicular ad hoc networks[J].Ad Hoc Networks,2019,86:154-165.
[5]LU Z,QU G,LIU Z.A survey on recent advances in vehicular network security,trust,and privacy[J].IEEE Transactions on Intelligent Transportation Systems,2018,20(2):760-776.
[6]DAS R,DASH D,SARKAR M K.HTMS:fuzzy based hierarchical trust management scheme in WSN[J].Wireless Personal Communications,2020,112(2):1079-1112.
[7]ALNASSER A,SUN H,JIANG J.Recommendation-based trust model for vehicle-to-everything(V2X)[J].IEEE Internet of Things Journal,2019,7(1):440-450.
[8]SHAYESTEH B,HAKAMI V,AKBARIA.A trust manage-ment scheme for IoT-enabled environmental health/accessibility monitoring services[J].International Journal of Information Security,2020,19(1):93-110.
[9]SHEN C X.Building Cyber Security Defense by Trusted Computing 3.0[J].Journal of Information Security Research,2017,3(4):290-298.
[10]GB/T 40650-2021.可信平台控制模块[S].北京:中国标准出版社,2021.
[11]HUANG J H,SHEN C X,XIE W L.The TPCM 3P3C Defense Architecture of Safety and Trusted Platform [J].J.Wuhan Univ.(Nat.SCI.Ed.),2018,64(2):109-114.
[12]ZHANG J,NING Z,CAO H.An Intelligent Trusted Edge Data Production Method for Distributed Internet of Things,Neural Computing and Applications[J].Neural Computing & Applications,2023,35(29):21333-21347.
[13]ZHANG J,NING Z,WAQAS R A M,et al.A Many-objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem[J],IEEE Transactions on Mobile Computing,2023,23(2):1330-1346.
[14]SINGH J,BELLO Y,HUSSEINA R,et al.Hierarchical Security Paradigm for IoT Multiaccess Edge Computing[J].IEEE Internet Things J.,2021,8(7):5794-5805.
[15]ZHANG P,JIANG C,PANG X,et al.STEC-IoT:A Security Tactic by Virtualizing Edge Computing on IoT[J].IEEE Internet Things J.,2021,8(4):2459-2467.
[16]BASSET M A,MANOGARAN G,MOHAMED M.A Neutrosophic theory based security approach for fog and mobile-edge computing[J].Computer Networks,2019,157:122-132.
[17]ELGENDY I A,ZHANG W,TIAN Y C,et al.Resource allocation and computation offloading with data security for mobile edge computing[J].Future Generation Computer Systems,2019,100:531-541.
[18]TSAI J L,LO N W.A Privacy-Aware Authentication Schemefor Distributed Mobile Cloud Computing Services[J].IEEE Systems Journal,2017,9(3):805-815.
[19]HUANG B,LI Z,TANG P,et al.Security modeling and efficient computation offloading for service workflow in mobile edge computing[J].Future Generation Computer Systems,2019,97:755-774.
[20]AAKASH B,ZACHARY E,ZACHARY K,et al.Graph Context Encoding for Neural Source Code Summarization[J].IEEE Transactions on Software Engineering,2023,49(9):4268- 4281.
[21]HUANG J H,SHEN C X.Trusted Platform Design of Serverwith TPCM Active Defense [J].Journal of Zhengzhou University(Natural Science Edition),2019,51(3):1-6.
[1] YANG Yu-li, LI Yu-hang, DENG An-hua. Trust Evaluation Model of Cloud Manufacturing Services for Personalized Needs [J]. Computer Science, 2022, 49(3): 354-359.
[2] ZHANG Guang-hua, YANG Yao-hong, ZHANG Dong-wen, LI Jun. Secure Routing Mechanism Based on Trust Against Packet Dropping Attack in Internet of Things [J]. Computer Science, 2019, 46(6): 153-161.
[3] XU Xue-fei, LI Jian-hua, YANG Ying-hui and GUO Rong. Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model [J]. Computer Science, 2016, 43(9): 169-174.
[4] YOU Jing, FENG Hui and SUN Yu-qiang. Trust Evaluation and Service Selection Based on Collaborative Recommendation for Cloud Environment [J]. Computer Science, 2016, 43(5): 140-145.
[5] ZHOU Guo-qiang, LIU Hong-fang and WANG Zi-yuan. Trust Evaluation Model with Eliminating Random Recommendation [J]. Computer Science, 2016, 43(4): 155-159.
[6] YANG Yong-fei, LIU Guang-jie and DAI Yue-wei. Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network [J]. Computer Science, 2015, 42(Z6): 388-392.
[7] LI Jian-li, DENG Xiao, WANG Yi-mou and XIE Yue. Security and Efficiency Negotiation Model [J]. Computer Science, 2015, 42(Z6): 378-381.
[8] WANG Jun, LIU Wen-fen and GAO Yan. Trust Model of Cloud Computing Based on Multi-parameters Evaluation [J]. Computer Science, 2015, 42(Z6): 315-320.
[9] YANG Lei,WANG Xing-wei and HUANG Min. k-Hop Backtracking Trusted QoS Rerouting Mechanism [J]. Computer Science, 2014, 41(5): 78-81.
[10] WANG Jin-dong,WEI Bo,ZHANG Heng-wei and He Jia-jing. Research on Service Trust Evaluation Approach under Cloud Computing Environment [J]. Computer Science, 2014, 41(12): 38-42.
[11] . Data Consistency Trust Evaluation of Wireless Sensor Networks Based on Multi-event Concurrent [J]. Computer Science, 2013, 40(3): 163-166.
[12] . Trust Evaluation and Control Analysis of FANP-based User Behavior in Cloud Computing Environment [J]. Computer Science, 2013, 40(1): 132-135.
[13] LI Li-miao,CHEN Zhi-gang,DENG Xiao-heng,GUI Jing-song. Research of Trust Evaluation Model Based on Reputation and Cooperation [J]. Computer Science, 2011, 38(5): 41-44.
[14] WANG Chang-da,HUA Ming-hui,ZHOU Cong-hua,SONG Xiang-mei,JU Shi-guang. Security Analysis of Access Control Policy Based on Predicate Abstract and Verification Space Division [J]. Computer Science, 2011, 38(10): 55-59.
[15] . [J]. Computer Science, 2006, 33(8): 98-99.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!