Research Article | Open Access | Download PDF
Volume 4 | Issue 3 | Year 2013 | Article Id. IJCTT-V4I3P138 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I3P138
Enabling MultiLevel Secured Framework for Remote Attestation
Sharmila Priya A.V, Mr Saishanmuga Raja
Citation :
Sharmila Priya A.V, Mr Saishanmuga Raja, "Enabling MultiLevel Secured Framework for Remote Attestation," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 3, pp. 391-394, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I3P138
Abstract
In distributed computing environment, computers have necessity to work closely together. In such an environment a single compromised machine can put the entire system integrity in danger. To mitigate the risk we propose a remote attestation framework for establishing the trustworthy platform between the system to ensure the secure data transfer and maintain system integrity. Our Framework validates the recent change of state, rather than considering the entire system configuration. With this model we set the tolerable risk level which provides efficient way to resolve host system with vulnerabilities and construct effective attestation result.
Keywords
Remote Attestation, Trusted Platform, Trusted Computing group, Tolerable Risk Level.
References
[1] T. Jaeger, R. Sailer, and U. Shankar, “PRIMA: Policy- reduced Integrity Measurement Architecture,” Proc. 11th ACM Symp. Access Control Models and Technologies (SACMAT ’06), 2006
[2] K.J. Biba, “Integrity Consideration for Secure Computer System,” Technical Report 3153, Mitre Corp., 1977.
[3] T. Fraser, “Lomac: Low Water-Mark Integrity Protection for Cots Environment,” Proc. IEEE Symp. Security and Privacy (SP ’00), May 2000.
[4] “T r u s t e d Computing Group , ” h t t p s : //www.trustedcomputinggroup.org, 2011.
[5 ] Liang Gu, Xuhua Ding, Robert H. Deng, Yanzhen Zou,Bing Xie, Weizhong Shao, Hong Mei, Model Driven Remote Attestation: Attesting Remote System from Behavioral Aspect. The 9th International Conference for Young Computer Scientists, Zhang jiajie, China,November 18, 2008.
[6] Vivek Haldar, Deepak Chandra and Michael Franz, Semantic Remote Attestation —A Virtual Machine directed approach to Trusted Computing. USENIX Virtual Machine Research and Technology Symposium, 2004
[7] W. Xu, M. Shehab, and G. Ahn, “Visualization Based Policy Analysis: Case Study in Selinux,” Proc. ACM Symp. Access Control Models and Technologies, 2008.
[10] W. Xu, X. Zhang, and G.-J. Ahn, “Towards System Integrity Protection with Graph-Based Policy An alysis,” Proc. 23rd Ann. IFIP WG 11.3 Working Conf. Data and Applications Security, 2009.
[11] “Piccolo ToolKit,” http://www.cs.umd.edu/hcil/jazz/. 2011.
[12] TCG, TCG Specification Architecture Overview, Specification Revision 1.4, 2nd August 2007, http://www.trustedcomputinggroup.org
[13] Trusted Computing Group (TCG). About the TCG http://www.trustedcomputinggroup.org/about/
[14] Benzel, T.V., Irvine, C.E., Levin, T.E., Bhaskara, G., Nguyen, T.D., Clark, P.C. Design principles for security.Technical Report NPS-CS-05-010,Naval Postgraduate School (September 2005)
[15] ZHANG Qiang, ZHU Li-na, ZHAO Jia. Research on Method of Remote Attestation in Trusted Computing, Control & Management, Microcomputer Information, Vol.24, No.4, 2008
[16] Joshua Guttman,Amy Herzog,Jon Millen,Leonard Monk,John Ramsdell, Justin Sheehy, Brian Snien, George Coker, NSA,Peter Loscocco, NSA. Attestation: Evidence and Trust, MITRE TECHNICAL REPORT, MTR080072 [17] YU Rong-wei, WANG Li-na, KUANG Bo. Method of designing security protocol for remote attestation, Journal on Communications, Vol.29 No.10, October 2008
[18] C. Xiao. Performance Enhancements for a Dynamic Invariant Detector. Masters thesis, MIT Department of Electrical Engineering and Computer Science, February 2007.
[19] E. Shi, A. Perrig, and L. van Doorn. BIND: A Time-of- use Attestation Service for Secure Distributed Systems. Proceedings of the IEEE Symposium on Security and Privacy,Oakland, California, May 2005.