Abstract
How to ensure the freshness of measurement and protect the concrete system configuration from leaking are two major challenges faced by existing remote attestation solutions. This paper proposes a new attestation architecture, called RTRA, to resolve these problems. In RTRA the real-time state of the attester is collected and reported. And the privacy about the attester’s binary configuration is protected through extending traditional property-based remote attestation architecture. Compared with existing property attestation architecture, RTRA is more scalable and secure since a unique proxy who is trusted totally to protect the whole configuration from leaking is not needed anymore.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Trusted Computing Group: TPM Main Part 1 Design Principles Specification Version 1.2 (2007)
Trusted Computing Group: TCG Specification Architecture Overview v1.2 (2004)
Sailer, R., Zhang, X., Jaeger, T., Doorn, L.v.: Design and implementation of a tcg-based integrity measurement architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, USA (August)
Trusted Computing Group: TCG Infrastructure Working Group Architecture Part II - Integrity Management (2006)
Jaeger, T., Sailer, R., Shankar, U.: PRIMA: policy-reduced integrity measurement architecture. In: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, New York, USA, pp. 19–28
Garfinnkel, T., Phaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: SOSP 2003: New York, USA (October 2003)
Haldar, V., Chandra Franz, D.: Semantic remote attestation: a virtual machine directed approach to trusted computing. In: Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium USENIX, San Jose, California (2004)
Liang, G., Xuhua, D., Robert, H.D., Bind, X., Hong, M.: Remote attestation on program execution. In: Proceedings of the 3rd ACM workshop on Scalable trusted computing. ACM, Alexandria (2008)
Poritz, J., Schunter, M., Herreweghen, V.E., Waidner, M.: Property Attestation–Scalable and Privacy-friendly Security Assessment of Peer Computers. Technical Report RZ 3548, IBM Research (May 2004)
Sadeghi, A.R., Stüble, C.: Property-based attestation for computing platforms: caring about properties, not mechanisms. In: Proceedings of the 2004 Workshop on New Security Paradigms, September. ACM Nova Scotia, Canada (2004)
Kühn, U., Selhorst, M., Stüble, C.: Realizing property-based attestation and sealing with commonly available hard- and software. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing. ACM Alexandria, Virginia (2007)
Chen, L., Landfermann, R., Löhr, H., Rohe, Sadeghi, A.R., Stüble, C.: A protocol for property-based attestation. In: Proceedings of the, ACM Workshop on Scalable Trusted Computing. ACM Alexandria, Virginia (2006)
Trusted Computing Group: TCG PC Client Specific Implementation Specification For Conventional BIOS (2005)
Trusted Grub, http://www.prosec.rub.de/trusted_grub.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, A., Feng, D. (2010). Real-Time Remote Attestation with Privacy Protection. In: Katsikas, S., Lopez, J., Soriano, M. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2010. Lecture Notes in Computer Science, vol 6264. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15152-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-15152-1_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15151-4
Online ISBN: 978-3-642-15152-1
eBook Packages: Computer ScienceComputer Science (R0)