The Open Cybernetics & Systemics Journal

2015, 9 : 415-421
Published online 2015 May 29. DOI: 10.2174/1874110X01509010415
Publisher ID: TOCSJ-9-415

Design and Implementation of Remote Anonymous Attestation Protocol Based on Trusted Cloud Computing Platform

Liu Yan and Xia Bin
College of Information Engineering, Zhongzhou University, Zhengzhou, Henan, 450044, P.R. China.

ABSTRACT

Trusted cloud computing platform is a combination of the use of virtual machine technology and trusted computing technology of cloud computing platform. Virtual machine technology because of its high separability of the client and the resource of high controllability, which greatly improves the security of the system; and the trusted computing technology is through the establishment of a trusted root in the hardware layer, solve the credibility and safety problem of the system fundamentally, because of the close combination of Trusted Computing and the virtual machine technology to establish a "trusted cloud computing" can ensure that the user data and application in cloud environment fundamentally safe. In this paper, the trusted computing technology and properties of signature mechanism based on the proposed a trusted cloud is simple, safe and efficient computing platform remote anonymous attestation protocol RAA-TCCP protocol. The protocols without bilinear pairings, also need not attribute certificate and AIK certificate, which greatly simplifies the certificate management, and simultaneously realize the identity and integrity of the state of computing nodes to prove. The protocol has unforgeability, platform identity anonymity, privacy protection and allocation of collusion resistance, also has the very high efficiency even in a high security strength, good to meet the safety requirements and performance requirements of the cloud environment, remote attestation.

Keywords:

Protocol, remote attestation, trusted cloud computing, Virtual machine technology.