On Remote Attestation Based on Trusted Cloud Computing

Yong Zhao; Pei-Yong Cong
November 2013
Journal of Applied Sciences;2013, Vol. 13 Issue 22, p5092
Academic Journal
Current studies on remote attestation for cloud computing neither consider the computational nodes as a group nor support dynamic trusted verification. To overcome these shortcomings, we put forward an attestation based on Identity and State. This new scheme can prevent jointly attack so as to have better security than existing ones. We concluded that effective rate of our scheme ascends as the threshold value increases.


Related Articles

  • Certificateless Proxy Signature from RSA. Lunzhi Deng; Jiwen Zeng; Yunyun Qu // Mathematical Problems in Engineering;2014, p1 

    Although some good results were achieved in speeding up the computation of pairing function in recent years, it is still interesting to design efficient crypto systems with less bilinear pairing operation. A proxy signature scheme allows a proxy signer to sign messages on behalf of an original...

  • State of the Art Practical Parallel Cryptographic Approaches. Damrudi, Masumeh; Ithnin, Norafida // Journal of Applied Sciences Research;Jul2011, Vol. 7 Issue 7, p660 

    Parallelism is one of the approaches to perform operations in a way to have speedup. Nowadays, This area of knowledge influences all fields so that one of the first methods of having speedup that comes to the mind is parallelism. Cryptography is an exciting and important aspect of human...

  • Numbers.  // InsideCounsel;Jul2014, Vol. 25 Issue 271, p43 

    Several charts are presented that illustrate motivation for cybercrimes in 2014, the top originating countries of cyberattacks in 2013, and the amount in exabyte of information stored in the cloud as of July 2014.

  • Analysis on Countering XML-Based Attacks in Web Services. Priyadharshini, M.; Baskaran, R.; Balaji, N.; Saleem Basha, M. S. // International Review on Computers & Software;Sep2013, Vol. 8 Issue 9, p2197 

    Cloud Computing is found to be today's most commonly used Service Oriented Architecture (SOA) implementation. Cloud utilizes XML-based technologies like Web Services for accessing and controlling the cloud, these are of particular importance for the security assessment of cloud systems. XML...

  • The Lesson of Estonia. Denning, Dorothy E. // Information Security;Sep2007, Vol. 10 Issue 8, p12 

    The author reflects on the attacks on Estonia and cyberterrorism. She argues that even though the cyberspace attacks did not injure or kill anyone, online activism should be given utmost attention. An overview of powerful cyber attack tools is offered. The author suggests that information...

  • Russian cyberstrike on Estonia: 'Virtual shot heard round the world'.  // Geo-Strategy Direct;12/22/2010, p1 

    The article offers information on a new report released by the U.S. government that reveals Russian government's cyberwarfare activities against the Baltic state of Estonia in 2007. Released on December 6, 2007 it says that since April 27, Estonia has been the victim of the world's first...

  • Cyberattacks and the enemy within. Kilcarr, Sean // Fleet Owner Exclusive Insight;9/30/2015, p1 

    A blog is presented in which the author discusses findings of 9th Annual Global Advanced Threat Landscape Survey by the security firm CyberArk which include cyberattacks by executives within an organization, false confidence in current cyber-security strategies, and account takeovers.

  • An Efficient Certificateless Threshold Decryption Schemes Based On Pairings. Fei Li; Wei Gao; Yilei Wang; Xueli Wang // Journal of Computers;Dec2012, Vol. 7 Issue 12, p2987 

    As the combination of certificateless encryption and threshold cryptography, the certificateless threshold decryption (CLTD) scheme can avoid both the single point of failure in the distributed networks and the inherent key escrow problem in identity-based cryptosystem. This paper presents a...

  • Efficient design of Certificateless Chameleon Signature from Bilinear Pairing. Thakur, Tejeshwari; Sharma, Neetu; Kumar Sharma, Birendra // International Journal of Database Theory & Application;2014, Vol. 7 Issue 3, p23 

    Certificateless public key cryptography (CL-PKC), does not require the use of the certificate to guarantee the authenticity of public keys. It does rely upon the use of a trusted third party (TTP), who is in possession of a master key. CL-PKC does not suffer from the key escrow property. Thus,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics