Loading...

Table of Content

    13 April 2017, Volume 3 Issue 4
    Building Cyber Security Defense by Trusted Computing 3.0
    2017, 3(4):  290-298. 
    Asbtract ( )   PDF (1075KB) ( )  
    Related Articles | Metrics
    An Overview of Trusted Computing Structure Specification
    2017, 3(4):  299-304. 
    Asbtract ( )   PDF (4215KB) ( )  
    References | Related Articles | Metrics
    Power system is an important national infrastructure. Its safe and stable operation is the important guarantee of economic development and national security and stability. Chinas power system has been in safety protection with relevant regulations and requirements of the departments of the state, but the face of the current complex cyberspace security situation, there are still subject to APT and other malicious code attack risk. Trusted computing refers to the calculation of the operation at the same time security, so that the operation and process behavior under any conditions, the results are always the same as expected, the calculation can be measured throughout the control, not interference, is to change the traditional “Kill” the basis of passive defense technology. This paper analyzes the information security risks and challenges faced by the power system. and introduces the research and application of the trusted computing technology in the power system, and gives the recommended prospect for the engineering application of the trusted computing in combination with the actual production situation. Based on the trusted computing technology to build the power information security and immune system, and create an important industrial production control system and information infrastructure in the application of trusted computing technology to achieve high safety level protection of the precedent, the safety of other industries construction is also given worthy of reference and reference to the model.
    Cryptographic Service Platform Based on Trusted Computing Technology
    2017, 3(4):  305-309. 
    Asbtract ( )   PDF (3854KB) ( )  
    References | Related Articles | Metrics
    Trusted computing is an active defense and immune security system. In this paper, from practical demands in financial industry and electronic government, we propose a cryptographic service platform based on trusted computing, which supports domesticallymade standard SM1, SM2, SM3, SM4 cryptographic algorithms and uses trusted computing technology to protect cryptographic deices and systems. This platform provides uniform cryptographic computing service, key management and cryptographic devices management etc, and it has excellent reliability, security, efficiency, parallel processing and load balancing. This platform can be applied to financial industry, electronic government and electronic commerce.
    The TPCM Platform Measurement and Control Design
    2017, 3(4):  310-315. 
    Asbtract ( )   PDF (4044KB) ( )  
    References | Related Articles | Metrics
    A trusted platform control module (TPCM) and a control method are proposed in this paper.This method is based on keeping the original motherboard design unchanged, and the TPCM is extended on the existed interface of the computer and measures the platform with the root of trust for measurement (RTM).Combined with the realization of the power control, it can solve the source of the boot untrusted problem fundamentally. In terms of keeping the credibility and integrity of the boot code, it checks the boot environment by inserting driver and protected policy into the boot code. If the trusted environment has been destroyed or the device firmware has been malicious tampered, it will enter untrusted operation environment or prevent the computer from been powered on per the security policy, which have been written in the TPCM in advance. The TPCM designed by this method has autonomous and absolute control right to the computer. Once the system out of control occurred caused by malicious code intrusion, the TPCM can protect the computer from been attacked through cut off power and any other absolute protection solutions. It is not only reliable and effective, but also low cost and easy to be installed.
    Research and Application of Trusted Software Base
    2017, 3(4):  316-322. 
    Asbtract ( )   PDF (4520KB) ( )  
    References | Related Articles | Metrics
    With the development of information science and technology, trusted computing, as the key technique of cyberspace security, it has become the focus of international cyberspace combat. China is promoting its application in various fields. Trusted software base (TSB), which lies in the kernel of trusted computing architecture, protect upperlevel application and manage lowerlevel trusted platform control module (TPCM) at the same time. In this paper, we describe the function structure, working procedure, supportability and interactive interfaces of TSB by core technology research of trusted software, and introduce its successful application in practical projects. As a whole, TSB serve as the solid foundation of trusted computing technology which can promote its further development.
    Research on Key Techniques of Trusted Server Platform in Cloud Environment
    2017, 3(4):  323-331. 
    Asbtract ( )   PDF (7035KB) ( )  
    References | Related Articles | Metrics
    Nowadays, the cloud environment still confronted with a severe challenge on issues of security threats, and trusted platform control module (TPCM) technology provides an effective countermeasure for building a server platform that is secure, proactive, and controllable. To resolve the two completeness issues in TPCMbased server realizations, in this paper we propose a server platform architecture, which is based on TPCM and trusted software base (TSB). Concerning server hardware, we present a poweron timing control scheme that takes outofband management module (OMM) into consideration, and a dedicated scheme for establishing the trust chain. Meanwhile, we illustrate some basic requirements and insights in the realization of virtual root of trust, and we present a solution for virtual root of trust for measurement (VRTM). We also give some discussion on other key techniques including trusted migrations. We believe this work can serve as a practical reference in the design of TPCMbased cloud server platforms.
    The Implementation and Application of Trusted Connect Architecture
    2017, 3(4):  332-338. 
    Asbtract ( )   PDF (5568KB) ( )  
    References | Related Articles | Metrics
    With the deep application of computer network, the main threats in network includes malicious code attacks, illegal information theft, data and system illegal destruction and so on. In these threats, malicious code attacks targeting users privacy information becomes the biggest security threat beyond traditional virus. The root of these security threats lies in the lack of architecturelevel computer malicious code attack immune mechanism which can help the computer immune system to prevent malicious code attacks, and make sure the computing network platform operate securely and reliably. Therefore, the technical concept of trusted network connection was proposed. Through establishing a specific mechanism of integrity measurement can achieve platform authentication in addition to the authentication of users identity in network access process. Platform authentication is an effective methods to prevent illegal accessing of untrustworthy platform with malicious code. This paper presents implementation and related supporting technologies of TCA specified in China national standards, and discusses the application of TCA.
    A Data Protection Method Based on Trusted Computing in Distributed Storage
    2017, 3(4):  339-343. 
    Asbtract ( )   PDF (4230KB) ( )  
    References | Related Articles | Metrics
    With the advent of the data age, data security has become more and more important. This paper presents a data protection method based on trusted computing technology in distributed storage system. The distributed storage system architecture includes clients, data servers and metadata servers that records or maps data to a real storage node based on a distributed algorithm. The distributed storage system runs data and metadata servers on machines which support trusted computing technology. In order to verify the identity of each server in the storage system and the identity of users, the system adds an authentication center to maintain the trusted status. The authentication center runs on the server with trusted computing functions. The data protection scheme proposed in this paper provides a set of effective protection mechanism based on the trusted computing technology for distributed storage system.
    Evaluation of Trusted Cloud Services Based on ThirdParty Regulation
    2017, 3(4):  344-352. 
    Asbtract ( )   PDF (6390KB) ( )  
    References | Related Articles | Metrics
    As a kind of new network services relying on cloud computing platform, cloud services have been widely applied in many areas. However, security risks under the outsourcing service mode and fraudulent activity under “payasyougo” mode also raise trust issues on cloud services. Now, the level of cloud services credibility has become the basis on whether the users tend to migrate their data to the clouds. Considering the current cloud services chaos, this paper proposes a security service valuation model of the controllable cloud computing platform based on the third party supervise and twoway trust. In order to provide both credible and available cloud services for the users, this paper also introduces comprehensive estimation in which the users experience preference depends on analytic hierarchy process and fuzzy mathematics, and ensures the security of the whole cloud computing platform. Experiment shows that the model can not only effectively improve the transaction success rate and the overall level of user satisfaction, but also resist some fraudulent activities caused by malicious entities to some extent.
    Research and Application of Trusted Computing in Electric Power System
    2017, 3(4):  353-358. 
    Asbtract ( )   PDF (5080KB) ( )  
    References | Related Articles | Metrics
    Power system is an important national infrastructure. Its safe and stable operation is the important guarantee of economic development and national security and stability. Chinas power system has been in safety protection with relevant regulations and requirements of the departments of the state, but the face of the current complex cyberspace security situation, there are still subject to APT and other malicious code attack risk. Trusted computing refers to the calculation of the operation at the same time security, so that the operation and process behavior under any conditions, the results are always the same as expected, the calculation can be measured throughout the control, not interference, is to change the traditional “Kill” the basis of passive defense technology. This paper analyzes the information security risks and challenges faced by the power system. and introduces the research and application of the trusted computing technology in the power system, and gives the recommended prospect for the engineering application of the trusted computing in combination with the actual production situation. Based on the trusted computing technology to build the power information security and immune system, and create an important industrial production control system and information infrastructure in the application of trusted computing technology to achieve high safety level protection of the precedent, the safety of other industries construction is also given worthy of reference and reference to the model.
    Research on Security Protection Architecture for Television Production and Broadcast Network System Based on Trusted Computing
    2017, 3(4):  359-363. 
    Asbtract ( )   PDF (10188KB) ( )  
    References | Related Articles | Metrics
    The network broadcast system of television is an important part of safe broadcast. The broadcast service has the characteristics of high flow, high bandwidth and low latency, and which brings new challenges to the traditional passive defense technologies, just like checking, killing, sealing and blocking. Based on trusted computing technology, this paper presents a security protection architecture with active defense ability for the network broadcast system of television and gives the realization methods of each key technologies, such as trusted measurement, trusted connection and signature verification. The proposed architecture can fundamentally ensure the security and accuracy of TV program production and broadcast, and guarantee the integrity and safe delivery of broadcast or business content. It also provides technical reference for improving the level of security protection of the network broadcast environment of television.
    Research of the Application of Trusted Computing in Key Systems of Insurance Industry
    2017, 3(4):  364-369. 
    Asbtract ( )   PDF (1799KB) ( )  
    References | Related Articles | Metrics
    With the rapid growth of informationization in various industries, trusted computing, as the key information security technology, plays an important role in ensuring business security and improving core competence. Trusted computing can build secure environments in information system by process white list mechanism, file access control mechanism, system authorization and dynamic realtime protection mechanism. The paper present methods in building active prevention network system with trusted computing technology by detailed analysis of its application in insurance company.
    Application of Safe Independent DecisionMaking and Controllable Product in ICS
    2017, 3(4):  370-374. 
    Asbtract ( )   PDF (4361KB) ( )  
    References | Related Articles | Metrics
    Based on the threats that exist in the ICS network interconnection and communication,host computing environment, centralized management,we introduced an independent decisionmaking and controllability protection system.By designing physical and environmental security, border protection, centralized management, network and communication security, application and data security, the ICS security can be protected comprehensively, and the system is independent decisionmaking and controllability. Also we introduced the application of the independent decisionmaking and controllability product: isolation exchange product. This system is aimed of autonomous controllable ICS security, In the long term, application of trusted computing technology in the ICS is the solution to ICS security.
    Construction of Critical Information Infrastructure Protection System Based on?Classifed?Protection?and?Trusted?Computing
    2017, 3(4):  375-381. 
    Asbtract ( )   PDF (1036KB) ( )  
    Related Articles | Metrics
    我国关键信息基础设施是在国家实行网络安全等级保护制度的基础上实行重点保护,可信计算是一种信息系统安全新技术,包括可信硬件、可信软件、 可信网络和可信计算应用等诸多方面。通过可信计算实现高安全保护等级的信息系统保障技术,包括全程一致访问控制技术、结构化保护技术以及多级互联技术,进而形成纵深防御的安全防护体系,使高安全保护等级信息系统的计算全程可测可控,实现运算和防护并存,构建我国关键信息基础设施保障体系。
    The Army Trusted Computing Standard of Civil-Military Integration
    2017, 3(4):  382-384. 
    Asbtract ( )   PDF (685KB) ( )  
    Related Articles | Metrics