Client Oriented Remote Attestation Model in Cloud Environment
نویسندگان
چکیده
منابع مشابه
Secured Client Server Communication in Cloud Environment
It’s smarter to rent than to buy such kind of service is provided by cloud computing. It is a model that is used for delivering resources that can be either Software or Hardware. Its means getting resources through network and more over that charges based only on the amount of computing resources used. Cloud service such as infrastructure as a service is caught for a security issue because by n...
متن کاملPolicy Driven Remote Attestation
Increasingly organisations need to exchange and share data amongst their employees as well as with other organisations. This data is often sensitive and/or confidential, and access to it needs to be protected. Architectures to protect disseminated data have been proposed earlier, but absence of a trusted enforcement point on the end-user machine undermines the system security. The reason being,...
متن کاملGroup-Based Attestation: Enhancing Privacy and Management in Remote Attestation
One of the central aims of Trusted Computing is to provide the ability to attest that a remote platform is in a certain trustworthy state. While in principle this functionality can be achieved by the remote attestation process as standardized by the Trusted Computing Group, privacy and scalability problems make it difficult to realize in practice: In particular, the use of the SHA-1 hash to mea...
متن کاملRemote Attestation on Function Execution
A program is a compound of various subroutines playing different roles. In this paper, we study how to attest the execution of those mission-critical subroutines whose execution is the basis to establish trust. Our results include a new attestation scheme called function attestation. Given a function F of a program P , the proposed scheme allows for an efficient and secure attestation by using ...
متن کاملBuilding Dynamic Remote Attestation Framework
Method Step 1: The attestee measures the information including TSL, codes and data and policy and send to the attester Step 2:The attestee generates the policy and TSL updates information and sends to attester Step 3: The attester verifies the measured information of the attestee Step 4: The attester verifies the reporting processes of the attester which is for the attestee information measurem...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Its Applications
سال: 2015
ISSN: 1738-9976
DOI: 10.14257/ijsia.2015.9.10.36