首页 | 官方网站   微博 | 高级检索  
     

面向用电采集系统终端的可信度量方案
引用本文:李红娇,王晓飞.面向用电采集系统终端的可信度量方案[J].上海电力学院学报,2019,35(3):236-241.
作者姓名:李红娇  王晓飞
作者单位:上海电力学院计算机科学与技术学院
基金项目:国家自然科学基金(61403247,61702321);上海市信息安全综合管理技术研究重点实验室开放课题(AGK2015005);上海市科学技术委员会地方能力建设项目(15110500700)。
摘    要:针对可信计算中可信度量的研究现状,对如何将可信计算引入用电采集终端的问题进行了深入研究,提出并构建了一种面向用电采集系统终端的可信度量方案。该方案以可信密码模块(TCM)为终端的可信芯片,以传统的可信度量技术为核心,并在可信度量环节引入了基于属性的远程证明方法。通过理论与实验分析可知,该方案可以有效改善二进制远程证明隐私性差、效率低、平台不可扩展等问题,提高了电力移动终端的信息安全主动防御能力。

关 键 词:用电采集系统终端  可信度量  可信密码模块
收稿时间:2018/7/10 0:00:00

Trusted Metric Scheme for Terminals of Power Collection Systems
LI Hongjiao and WANG Xiaofei.Trusted Metric Scheme for Terminals of Power Collection Systems[J].Journal of Shanghai University of Electric Power,2019,35(3):236-241.
Authors:LI Hongjiao and WANG Xiaofei
Affiliation:School of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 200090, China and School of Computer Science and Technology, Shanghai University of Electric Power, Shanghai 200090, China
Abstract:Aiming at the research status of trusted metrics in trusted computing,studies are conducted on the problem of how to introduce trusted computing into the power collection terminal,and a trusted metric scheme is constructed for the terminal of the power collection system.The scheme uses the trusted cryptographic module (TCM) as the trusted chip of the terminal,with the traditional trusted metric technology as the core,and introduces the attribute-based remote attestation method in the trusted metrics.Through theoretical and experimental analysis,it can be claimed that the scheme can effectively improve the problem of poor privacy,low efficiency,and non-expansion of the binary remote proof,and improve the information security active defense capability of the power mobile terminal.
Keywords:power collection terminal  trusted metric  trusted cryptography module
本文献已被 CNKI 等数据库收录!
点击此处可从《上海电力学院学报》浏览原始摘要信息
点击此处可从《上海电力学院学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号