International Journal of Computer
Trends and Technology

Research Article | Open Access | Download PDF

Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P138 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P138

Enabling MultiLevel Secured Framework for Remote Attestation


Sharmila Priya A.V, Mr Saishanmuga Raja

Citation :

Sharmila Priya A.V, Mr Saishanmuga Raja, "Enabling MultiLevel Secured Framework for Remote Attestation," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 391-394, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P138

Abstract

In distributed computing environment, computers have necessity to work closely together. In such an environment a single compromised machine can put the entire system integrity in danger. To mitigate the risk we propose a remote attestation framework for establishing the trustworthy platform between the system to ensure the secure data transfer and maintain system integrity. Our Framework validates the recent change of state, rather than considering the entire system configuration. With this model we set the tolerable risk level which provides efficient way to resolve host system with vulnerabilities and construct effective attestation result.

Keywords

Remote Attestation, Trusted Platform, Trusted Computing group, Tolerable Risk Level.

References

[1] T. Jaeger, R. Sailer, and U. Shankar, “PRIMA: Policy- reduced Integrity Measurement Architecture,” Proc. 11th ACM Symp. Access Control Models and Technologies (SACMAT ’06), 2006
[2] K.J. Biba, “Integrity Consideration for Secure Computer System,” Technical Report 3153, Mitre Corp., 1977.
[3] T. Fraser, “Lomac: Low Water-Mark Integrity Protection for Cots Environment,” Proc. IEEE Symp. Security and Privacy (SP ’00), May 2000.
[4] “T r u s t e d Computing Group , ” h t t p s : //www.trustedcomputinggroup.org, 2011.
[5 ] Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou,Bing Xie, Weizhong Shao, Hong Mei, Model Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. The 9th International Conference for Young Computer Scientists, Zhang jiajie, China,November 18, 2008.
[6] Vivek Haldar, Deepak Chandra and Michael Franz, Semantic Remote Attestation —A Virtual Machine directed approach to Trusted Computing. USENIX Virtual Machine Research and Technology Symposium, 2004
[7] W. Xu, M. Shehab, and G. Ahn, “Visualization Based Policy Analysis: Case Study in Selinux,” Proc. ACM Symp. Access Control Models and Technologies, 2008.

[8]    M. Green, “Toward a Perceptual  Science of  Multidimensional Data Visualization: Bertin and Beyond,”http://www.ergogero.com/dataviz/dviz2.html.
[10]  W. Xu, X. Zhang, and G.-J. Ahn, “Towards System Integrity Protection with Graph-Based Policy An alysis,” Proc. 23rd Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, 2009. 
[11] “Piccolo ToolKit,” http://www.cs.umd.edu/hcil/jazz/. 2011.
[12]  TCG, TCG Specification Architecture Overview, Specification Revision 1.4, 2nd August 2007, http://www.trustedcomputinggroup.org 
[13] Trusted Computing Group (TCG). About the TCG     http://www.trustedcomputinggroup.org/about/ 
[14] Benzel, T.V., Irvine, C.E., Levin, T.E., Bhaskara, G., Nguyen, T.D., Clark, P.C. Design principles for security.Technical Report NPS-CS-05-010,Naval Postgraduate School (September 2005) 
[15] ZHANG Qiang, ZHU Li-na, ZHAO Jia. Research   on Method of Remote Attestation in Trusted Computing, Control & Management, Microcomputer Information, Vol.24, No.4, 2008 
[16] Joshua Guttman,Amy Herzog,Jon Millen,Leonard   Monk,John Ramsdell, Justin Sheehy, Brian Snien, George Coker, NSA,Peter Loscocco, NSA. Attestation: Evidence and Trust, MITRE TECHNICAL REPORT, MTR080072  [17]   YU Rong-wei, WANG Li-na, KUANG Bo. Method of   designing security protocol for remote attestation, Journal on Communications, Vol.29 No.10, October 2008 
[18]   C. Xiao. Performance Enhancements for a Dynamic Invariant  Detector. Masters thesis, MIT Department of Electrical Engineering and Computer Science, February 2007. 
[19]  E. Shi, A. Perrig, and L. van Doorn. BIND: A Time-of- use Attestation Service for Secure Distributed Systems. Proceedings  of  the IEEE Symposium on Security and   Privacy,Oakland, California, May 2005.