首页> 外文期刊>Scientific programming >Research on Linux Trusted Boot Method Based on Reverse Integrity Verification
【24h】

Research on Linux Trusted Boot Method Based on Reverse Integrity Verification

机译:基于逆完整性验证的Linux可信启动方法研究

获取原文
获取原文并翻译 | 示例
           

摘要

Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.
机译:可信计算旨在借助安全硬件TPM为信息系统构建可信计算环境,事实证明,可信环境是抵御网络安全威胁的有效方法。但是,到目前为止,TPM芯片尚未在大多数计算设备中广泛部署,因此限制了可信计算技术的应用范围。为了解决现有计算平台中缺乏可信硬件的问题,本文引入了替代安全硬件USBKey来模拟TPM的基本功能,并提出了一种新的基于反向USBKey的完整性验证模型来实现对TPM的反向完整性验证。操作系统启动过程,可以在没有TPM的最终系统中实现操作系统的可信启动效果。本文设计并实现了一种基于反向完整性验证的Linux操作系统启动方法,在可信启动过程中逐步验证和保护操作系统中数据和可执行文件的完整性。它实现了不带TPM的操作系统的受信任启动,并支持平台的远程认证。通过我们的方法的增强,可信任计算技术的灵活性得到了极大的提高,并且有可能将可信任计算应用在大规模计算环境中。

著录项

  • 来源
    《Scientific programming》 |2016年第1期|4516596.1-4516596.12|共12页
  • 作者单位

    Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China;

    Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China;

    Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China;

    Natl Univ Def Technol, Sch Comp, Changsha 410073, Hunan, Peoples R China;

    Hunan Normal Univ, Coll Polytech, Changsha 410073, Hunan, Peoples R China;

    Luoyang Inst Sci & Technol, Dept Comp & Informat Engn, Luoyang 471023, Henan, Peoples R China;

  • 收录信息 美国《工程索引》(EI);
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号