SlideShare a Scribd company logo
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME
140
THE PRIVACY FEATURE OF TRUSTED COMPUTING TECHNOLOGY
USING THE CONCEPT OF DIRECT ANONYMOUS ATTESTATION WITH
CLOUD AS A TECHNIQUE
E. PADMA Prof. Dr. S. RAJALAKSHMI
Research Scholar Director, SJCAR
SCSVMV University, Enathur SCSVMV University, Enathur
ABSTRACT
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to
achieve a greater level of security. In the Distributed Environment all the systems are connected
together with a limited bandwidth security feature. The TPM module will increase the security
feature by the concept of DAA. Direct anonymous attestation (DAA) is a special digital signature
primitive, which provides a balance between signer authentication and privacy. A DAA scheme
involves a set of issuers, signers, and verifiers. An issuer is in charge of verifying the legitimation of
signers and of issuing a DAA credential to each signer. The TPM is the real signer and holds the
secret signing key. Authentication can be applied at the level of the virtual private network (VPN).
As a technique of cloud service the authentication to the distributed environment can be modeled
with the Trusted Platform Technology.
Keywords: Trusted Platform Module, Virtual Private Network, Direct Anonymous Attestation,
Authentication.
I. INTRODUCTION
The distributed systems and network computing were used widely; security has become an
urgent problem. To provide more security the verification and authentication of the user can be
widely used by the technique of Trusting Computing [3]. The Trusted Computing as a hardware chip
enabled the security feature with limited exemptions. Trusted Computing in the field of software
using the Direct Anonymous Attestation will prove the model to be more secure. The security for the
distributed systems will be provided enormously using the verification and attestation key. The DAA
credentials have to be assigned to each distributed system users. Cloud computing is concerned with
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
TECHNOLOGY (IJCET)
ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 2, February (2014), pp. 140-144
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 4.4012 (Calculated by GISI)
www.jifactor.com
IJCET
© I A E M E
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME
141
the sharing and coordinated use of diverse resources in distributed organizations. Cloud computing
provides a facility that enable large-scale controlled sharing and interoperation among resources that
are dispersedly owned and managed. The Trusted Computing Platform (TCP) has to be integrated
with Trusted Platform Module (TPM), in order to protect the distributed computing system. The TCP
can improve the cloud computing security. A Software middleware, the Trusted Platform Base
Service on which the cloud computing application can use easily the security function of TPM.
II. RELATED WORK ABOUT TPM WITH DISTRIBUTED COMPUTING
ENVIRONMENT
A. Current Security Model of Distributed Computing
The Trusted Platform Module with distributed system gives less performance feature. The
Trusted Computing Group provides enormous services for the massive number of system. The
Security model of Distributed System alone deals with Secrecy, Integrity, Availability and
Accountability. The Secrecy feature deals with controlling the read information. Integrity deals with
how Information changes are used. The term Availability prompts access to information and
resources. The Accountability service provides information about the individual users who had
accessing right [11]. The Security Information was concerned with human user authentication, peer-
to-peer authentication for communicating entities. The distribution demands a communication
system between entities. Security messages and secured messages can be transported. The
performance is reduced apparently when the cryptographic computing are processed. The creation
and protection of certificates are not secure enough for the distributed computing environments [3].
The trusted root in the distributed computing environment has not been defined clearly. The
Challenges of the exempted performance can be defined in future using the attestation and
verification for each user individually.
B.Challenges of Distributed Computing Environment
The challenges for distributed computing systems to satisfy increasing demands for various
applications become greater. Apart from reliability, performance, availability and many other entities
such as security, privacy, trustworthiness, situation awareness, flexibility and rapid development of
various applications have also become important [2]. Managing a large number of personal devices
and data, improving the auto commute through data dissemination. Research in security, storage
systems, simplifying management, and reliability is likely to lead to the creation of important new
knowledge and design [10].The Security policies for the distributed users using their resources are
limited. The scope of the security mechanism has to be implemented with proper services. Each
individual user has to maintain their own verifiers for accessing any available resources with the
prescribed mechanism. The requirements for the distributed users to be enhanced with the feature of
Attestation.
III. TRUSTED COMPUTING TECHNOLOGY
The basic features of TPM include configuration management and basic cryptographic
operation. The configuration management is the main design goal of TPM [9]. TPM can enforce
security policies on hierarchies for the purpose of protection. In 1999, HP,IBM, Compaq, Intel, and
Microsoft announced the formation of the Trusted Computing Platform Alliance (TCPA) that
focused on building confidence and trust of computing platform in e-business transactions. In 2003,
the Trusted Computing Group (TCG) was formed and has adopted the specifications developed by
TCPA. The distinguishing feature of TCG technology is arguably the incorporation of “roots of
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME
142
trust” into computer platforms [3] Trusted platform software stack (TSS) provides the interfaces
between TPM and other system modules. To measure each of the components in the system (both
hardware and software) and securely store the results of the measurements in Platform Configuration
Registers (PCR) within the TPM
IV. DISTRIBUTEDCOMPUTING ENVIRONMENT WITH DAA
Direct Anonymous Attestation (DAA) is a scheme developed by Brickell, Camenisch, and
Chen[12] for remote authentication of a security hardware module called Trusted Platform Module
(TPM) which is the core component of the trusted computing platform to remotely convince a
communication partner that it is indeed a Trusted Platform Module[7].
Fig1. Architecture of Distributed Environment
The DAA Algorithm deals with the concept of Attestation key. The keys involved in DAA
provide signing and verifying authority for all the users. The Algorithm contains full protection
with authentication. The Distributed Computing Environment needs more security feature to protect
from the attackers. As a view the Trusted Attestation Key has been acknowledged to carry over the
process. DAA Algorithm deals with distributed resource sharing in the form of allocating each
system a privacy enhancing measure. The counter value is kept for the easy identification of each
and every system accessing with the Trusted Attestation Key (TAK). The Trusted party alone can
have the access with the shared resource. The Algorithm finds the intruder while signed in as
unauthorised user. Remotely the Authorisation can be verified using the Concept of TAK. The
massive number of users will sign in at the moment and access the system distributedly. To track the
efficiency factor a register is maintained separately called Efficient Configuration Register (ECR).
The ECR will maintain the record of individual user from the distributed environment and work with
full trustiness feature. The Efficiency factor can be calculated using the register value along with the
counter value that has been generated. All the system remotely accessed can be given identification
to know the trustworthiness.
V. PROPOSED METHODOLOGY
In the proposed methodology, the attestation key algorithm plays a role of attesting the
authorized user to access the data and to maintain the integrity. The key will be generated using
authentication code. The generated key will be used by each individual to share the distributed
resource. The algorithm checks for the authorization and then grants the right for accessing the
information. The algorithm then enters in verification phase by verifying the trusted user by issuing
the attested key. In this phase, the signature of the trusted party will be verified using the
TPM
DISTRIBUTED
ENVIRONMENT
DAA
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME
143
cryptosystem. The TAK Algorithm measures the efficiency of resources that are accessed. The
security features for the integrity also to be measured using this algorithm.
Step 1: generation of key
Step 2: check for authorization
Step 3: verification phase
VI. BUILD TRUSTED ENVIRONMENT WITH DAA USING CLOUD AS TECHNIQUE
The trusted computing mechanism can provide a way that can help to establish a security
environment. The model of trusted computing is originally designed to provide the privacy and trust
in the personal platform and the trusted computing platform is the base of the trusted computing[3].
Distributed computing should involve a large amount of entities, such as users and resources from
different sources; the authentication is important and complicated. The model for direct anonymous
attestation is varied based on the signature. Each system is digitized with verification and signing. In
this paper the new concept of DAA with Trusted Attestation Key as a security feature enhancing the
distributed system to work without any interruption of the intruders. Cloud as a technique the
Attestation Algorithm with the efficiency factor is measured. The root of trust for all the users and
how far the accessing varies with one user to another user can also be measured with the Attestation.
The ECR will maintain separate register for all the users who are connected together to access the
system. There are some pitfalls with the efficiency measurement in cloud security. The DAA plays a
role to rectify the vast amount of illegal authorities accessing the system. The trusted environment
can be build with the authentication protocol which can be exchanged between the user and the
server.
VII. CONCLUSION
In this paper a new DAA scheme called Trusted Attestation Key has been defined to measure
the usage of authorized users. The Authentication can be conformed with the signing model. The
security with the Trusted Attestation key algorithm has some limitation in this paper. The distributed
computing environment works with fault tolerance. As the case of distributed computing
environment the bandwidth of the measurement feature can be more increased for the various
systems. The Trusted Computing environment has the root of trust with the authentication protocol.
The performance criteria of the system have to be further redesigned as a future work. Cloud as a
technique is considered in this paper as an initial phase. The security mechanism to be further
measured. The Efficiency Factor for the configuration measurement of all distributed system to be
configured in the future.
VIII. REFERENCES
[1] Ronald Toegl, Thomas Winkler, Mohammad Nauman and Theodore W. Hong Specification
and Standardization of a Java Trusted Computing API SOFTWARE – PRACTICE AND
EXPERIENCE Softw. Pract. Exper. 2011 Published online in Wiley Online Library
(wileyonlinelibrary.com).
[2] Yau, Stephen S , High Performance Computing and Communications (HPCC), 2011 IEEE
13th International Conference on 2-4 Sept. 2011.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME
144
[3] Zhidong Shen, Qiang Tong ,The Security of Cloud Computing System enabled by Trusted
Computing Technology, 2010 2nd
International Conference on Signal Processing Systems
(ICSPS)
[4] Stueble C, Zaerin A. µTSS - a simplified trusted software stack. Proceedings of the 3rd
International Conference on Trust and Trustworthy Computing (TRUST 2010), no. 6101 in
LNCS, Springer Verlag, 2010.
[5] C. Latze, U. Ultes-Nitsche, F. Baumgartner, Extensible Authentication Protocol Method for
Trusted Computing Groups (TCG) Trusted Platform Modules, Work in Progress, 2009
[6] Pirker M, Toegl R, Hein D, Danner P. A Privacy CAfor anonymity and trust. Proc. Trust ’09,
LNCS, Vol. 5471.Springer, 2009.
[7] CHEN Xiaofeng and FENG Dengguo, Direct Anonymous Attestation for Next Generation
TPM JOURNAL OF COMPUTERS, VOL.3, NO. 12, DECEMBER 2008.
[8] Microsoft. TPM Base Services. Microsoft Developer Network, 2007.
http://msdn.microsoft.com/en-us/library/ aa446796(VS.85).aspx [27 May 2011]
[9] Tian Haibo, Wang Yumin The Future Network Security, China Communications August
2006.
[10] M. Frans Kaashoek Barbara Liskov David Andersen Mike Dahlin Carla Ellis Steve Gribble
Anthony Joseph Hank Levy Andrew Myers Jeff Mogul Ion Stoica Amin Vahdat, Report of
the NSF Workshop on Research Challenges in Distributed Computer Systems, Dec 4 2005.
[11] Claus Fritzner,Leif Nilsen And smund Skomedal , Protecting Security Information in
DistributedSystems,GH2986891/0000/0245$01.00@1991 IEEE
[12] Ernest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM
Conference on Computer and Communications Security 2004: 132-145.
[13] Elaine Shi, Adrian Perrig, Leendert Van Doorn BIND: A Fine-grained Attestation Service for
Secure Distributed Systems.
[14] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in Cloud Computing”,
International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1,
2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[15] Abhishek Pandey, R.M.Tugnayat and A.K.Tiwari, “Data Security Framework for Cloud
Computing Networks”, International Journal of Computer Engineering & Technology
(IJCET), Volume 4, Issue 1, 2013, pp. 178 - 181, ISSN Print: 0976 – 6367, ISSN Online:
0976 – 6375.
[16] A.Madhuri and T.V.Nagaraju, “Reliable Security in Cloud Computing Environment”
International Journal of Information Technology and Management Information Systems
(IJITMIS), Volume 4, Issue 2, 2013, pp. 23 - 30, ISSN Print: 0976 – 6405, ISSN Online:
0976 – 6413.

More Related Content

PDF
Ijnsa050214
PDF
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
PDF
3778975074 january march 2015 1
PDF
Systematic Review Automation in Cyber Security
PDF
Two Aspect Validation Control Frameworks for Online Distributed Services
PDF
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
PDF
IRJET- Secure Data Protection in Cloud Computing
DOCX
CSEC630_TeamAssignment_TeamBlazer_FINAL
Ijnsa050214
E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Chal...
3778975074 january march 2015 1
Systematic Review Automation in Cyber Security
Two Aspect Validation Control Frameworks for Online Distributed Services
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IRJET- Secure Data Protection in Cloud Computing
CSEC630_TeamAssignment_TeamBlazer_FINAL

What's hot (20)

DOCX
CSEC630 individaul assign
PDF
Employment Feedback by Securing Data using Anonymous Authentication
PDF
A study on security responsibilities and adoption in cloud
PDF
A study on security responsibilities and adoption in
PDF
IRJET- Multimedia Content Security with Random Key Generation Approach in...
PDF
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
PDF
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
PDF
Ijnsa050208
PDF
A Trusted Integrity verification Architecture for Commodity Computers
PDF
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
PDF
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
PDF
Intrusion Detection in Industrial Automation by Joint Admin Authorization
PDF
IRJET-Domain Data Security on Cloud
PDF
Performance Enhancement of VNSIP approach, using MCAC algorithm
PDF
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
PDF
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
PDF
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
PDF
Cisco cybersecurity essentials chapter - 6
PDF
A Novel SDN Architecture for IoT Security
CSEC630 individaul assign
Employment Feedback by Securing Data using Anonymous Authentication
A study on security responsibilities and adoption in cloud
A study on security responsibilities and adoption in
IRJET- Multimedia Content Security with Random Key Generation Approach in...
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Ijnsa050208
A Trusted Integrity verification Architecture for Commodity Computers
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
Intrusion Detection in Industrial Automation by Joint Admin Authorization
IRJET-Domain Data Security on Cloud
Performance Enhancement of VNSIP approach, using MCAC algorithm
Novel Advances in Measuring and Preventing Software Security Weakness: Contin...
SLA Based Information Security Metric for Cloud Computing from COBIT 4.1 Fram...
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
Cisco cybersecurity essentials chapter - 6
A Novel SDN Architecture for IoT Security
Ad

Viewers also liked (10)

PDF
50120140502014
PDF
50120140501015 2
PDF
10120140504013
PDF
20320140502010
PDF
10120130406013
PDF
50120130406016
PDF
10120130406014 2-3
PDF
30120140502017
PDF
50120140502016
PDF
20320130406010 2
50120140502014
50120140501015 2
10120140504013
20320140502010
10120130406013
50120130406016
10120130406014 2-3
30120140502017
50120140502016
20320130406010 2
Ad

Similar to 50120140502015 (20)

PDF
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
PPT
Abbie Barbir Tcg Final
PPT
Trusted Computing _plate form_ model.ppt
PPT
Trusted _Computing _security mobile .ppt
PDF
Secure Trustworthy Enterprise
PDF
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
DOCX
Providing user security guarantees in public infrastructure clouds
PDF
Cloud Security and Data Integrity with Client Accountability Framework
PDF
Cloud Computing: Provide privacy and Security in Database-as-a-Service
PDF
1376842823 2982373
PDF
1376842823 2982373
PDF
Enhanced security framework to ensure data security
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PDF
Enhanced security framework to ensure data security in cloud using security b...
PPT
Introduction of Trusted Network Connect (TNC)
PPTX
Trust and Cloud Computing, removing the need to trust your cloud provider
PPTX
Trust and Cloud computing, removing the need for the consumer to trust their ...
PDF
A Survey on Different Techniques Used in Decentralized Cloud Computing
PPT
trusted computing platform alliancee.ppt
PPT
Trusted computing introduction and technical overview
An Comparison with Property Based Resource Attestation to Secure Cloud Enviro...
Abbie Barbir Tcg Final
Trusted Computing _plate form_ model.ppt
Trusted _Computing _security mobile .ppt
Secure Trustworthy Enterprise
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Providing user security guarantees in public infrastructure clouds
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Computing: Provide privacy and Security in Database-as-a-Service
1376842823 2982373
1376842823 2982373
Enhanced security framework to ensure data security
Trust and Cloud computing, removing the need for the consumer to trust their ...
Enhanced security framework to ensure data security in cloud using security b...
Introduction of Trusted Network Connect (TNC)
Trust and Cloud Computing, removing the need to trust your cloud provider
Trust and Cloud computing, removing the need for the consumer to trust their ...
A Survey on Different Techniques Used in Decentralized Cloud Computing
trusted computing platform alliancee.ppt
Trusted computing introduction and technical overview

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Chapter 3 Spatial Domain Image Processing.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

50120140502015

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME 140 THE PRIVACY FEATURE OF TRUSTED COMPUTING TECHNOLOGY USING THE CONCEPT OF DIRECT ANONYMOUS ATTESTATION WITH CLOUD AS A TECHNIQUE E. PADMA Prof. Dr. S. RAJALAKSHMI Research Scholar Director, SJCAR SCSVMV University, Enathur SCSVMV University, Enathur ABSTRACT The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security. In the Distributed Environment all the systems are connected together with a limited bandwidth security feature. The TPM module will increase the security feature by the concept of DAA. Direct anonymous attestation (DAA) is a special digital signature primitive, which provides a balance between signer authentication and privacy. A DAA scheme involves a set of issuers, signers, and verifiers. An issuer is in charge of verifying the legitimation of signers and of issuing a DAA credential to each signer. The TPM is the real signer and holds the secret signing key. Authentication can be applied at the level of the virtual private network (VPN). As a technique of cloud service the authentication to the distributed environment can be modeled with the Trusted Platform Technology. Keywords: Trusted Platform Module, Virtual Private Network, Direct Anonymous Attestation, Authentication. I. INTRODUCTION The distributed systems and network computing were used widely; security has become an urgent problem. To provide more security the verification and authentication of the user can be widely used by the technique of Trusting Computing [3]. The Trusted Computing as a hardware chip enabled the security feature with limited exemptions. Trusted Computing in the field of software using the Direct Anonymous Attestation will prove the model to be more secure. The security for the distributed systems will be provided enormously using the verification and attestation key. The DAA credentials have to be assigned to each distributed system users. Cloud computing is concerned with INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 4.4012 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME 141 the sharing and coordinated use of diverse resources in distributed organizations. Cloud computing provides a facility that enable large-scale controlled sharing and interoperation among resources that are dispersedly owned and managed. The Trusted Computing Platform (TCP) has to be integrated with Trusted Platform Module (TPM), in order to protect the distributed computing system. The TCP can improve the cloud computing security. A Software middleware, the Trusted Platform Base Service on which the cloud computing application can use easily the security function of TPM. II. RELATED WORK ABOUT TPM WITH DISTRIBUTED COMPUTING ENVIRONMENT A. Current Security Model of Distributed Computing The Trusted Platform Module with distributed system gives less performance feature. The Trusted Computing Group provides enormous services for the massive number of system. The Security model of Distributed System alone deals with Secrecy, Integrity, Availability and Accountability. The Secrecy feature deals with controlling the read information. Integrity deals with how Information changes are used. The term Availability prompts access to information and resources. The Accountability service provides information about the individual users who had accessing right [11]. The Security Information was concerned with human user authentication, peer- to-peer authentication for communicating entities. The distribution demands a communication system between entities. Security messages and secured messages can be transported. The performance is reduced apparently when the cryptographic computing are processed. The creation and protection of certificates are not secure enough for the distributed computing environments [3]. The trusted root in the distributed computing environment has not been defined clearly. The Challenges of the exempted performance can be defined in future using the attestation and verification for each user individually. B.Challenges of Distributed Computing Environment The challenges for distributed computing systems to satisfy increasing demands for various applications become greater. Apart from reliability, performance, availability and many other entities such as security, privacy, trustworthiness, situation awareness, flexibility and rapid development of various applications have also become important [2]. Managing a large number of personal devices and data, improving the auto commute through data dissemination. Research in security, storage systems, simplifying management, and reliability is likely to lead to the creation of important new knowledge and design [10].The Security policies for the distributed users using their resources are limited. The scope of the security mechanism has to be implemented with proper services. Each individual user has to maintain their own verifiers for accessing any available resources with the prescribed mechanism. The requirements for the distributed users to be enhanced with the feature of Attestation. III. TRUSTED COMPUTING TECHNOLOGY The basic features of TPM include configuration management and basic cryptographic operation. The configuration management is the main design goal of TPM [9]. TPM can enforce security policies on hierarchies for the purpose of protection. In 1999, HP,IBM, Compaq, Intel, and Microsoft announced the formation of the Trusted Computing Platform Alliance (TCPA) that focused on building confidence and trust of computing platform in e-business transactions. In 2003, the Trusted Computing Group (TCG) was formed and has adopted the specifications developed by TCPA. The distinguishing feature of TCG technology is arguably the incorporation of “roots of
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME 142 trust” into computer platforms [3] Trusted platform software stack (TSS) provides the interfaces between TPM and other system modules. To measure each of the components in the system (both hardware and software) and securely store the results of the measurements in Platform Configuration Registers (PCR) within the TPM IV. DISTRIBUTEDCOMPUTING ENVIRONMENT WITH DAA Direct Anonymous Attestation (DAA) is a scheme developed by Brickell, Camenisch, and Chen[12] for remote authentication of a security hardware module called Trusted Platform Module (TPM) which is the core component of the trusted computing platform to remotely convince a communication partner that it is indeed a Trusted Platform Module[7]. Fig1. Architecture of Distributed Environment The DAA Algorithm deals with the concept of Attestation key. The keys involved in DAA provide signing and verifying authority for all the users. The Algorithm contains full protection with authentication. The Distributed Computing Environment needs more security feature to protect from the attackers. As a view the Trusted Attestation Key has been acknowledged to carry over the process. DAA Algorithm deals with distributed resource sharing in the form of allocating each system a privacy enhancing measure. The counter value is kept for the easy identification of each and every system accessing with the Trusted Attestation Key (TAK). The Trusted party alone can have the access with the shared resource. The Algorithm finds the intruder while signed in as unauthorised user. Remotely the Authorisation can be verified using the Concept of TAK. The massive number of users will sign in at the moment and access the system distributedly. To track the efficiency factor a register is maintained separately called Efficient Configuration Register (ECR). The ECR will maintain the record of individual user from the distributed environment and work with full trustiness feature. The Efficiency factor can be calculated using the register value along with the counter value that has been generated. All the system remotely accessed can be given identification to know the trustworthiness. V. PROPOSED METHODOLOGY In the proposed methodology, the attestation key algorithm plays a role of attesting the authorized user to access the data and to maintain the integrity. The key will be generated using authentication code. The generated key will be used by each individual to share the distributed resource. The algorithm checks for the authorization and then grants the right for accessing the information. The algorithm then enters in verification phase by verifying the trusted user by issuing the attested key. In this phase, the signature of the trusted party will be verified using the TPM DISTRIBUTED ENVIRONMENT DAA
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME 143 cryptosystem. The TAK Algorithm measures the efficiency of resources that are accessed. The security features for the integrity also to be measured using this algorithm. Step 1: generation of key Step 2: check for authorization Step 3: verification phase VI. BUILD TRUSTED ENVIRONMENT WITH DAA USING CLOUD AS TECHNIQUE The trusted computing mechanism can provide a way that can help to establish a security environment. The model of trusted computing is originally designed to provide the privacy and trust in the personal platform and the trusted computing platform is the base of the trusted computing[3]. Distributed computing should involve a large amount of entities, such as users and resources from different sources; the authentication is important and complicated. The model for direct anonymous attestation is varied based on the signature. Each system is digitized with verification and signing. In this paper the new concept of DAA with Trusted Attestation Key as a security feature enhancing the distributed system to work without any interruption of the intruders. Cloud as a technique the Attestation Algorithm with the efficiency factor is measured. The root of trust for all the users and how far the accessing varies with one user to another user can also be measured with the Attestation. The ECR will maintain separate register for all the users who are connected together to access the system. There are some pitfalls with the efficiency measurement in cloud security. The DAA plays a role to rectify the vast amount of illegal authorities accessing the system. The trusted environment can be build with the authentication protocol which can be exchanged between the user and the server. VII. CONCLUSION In this paper a new DAA scheme called Trusted Attestation Key has been defined to measure the usage of authorized users. The Authentication can be conformed with the signing model. The security with the Trusted Attestation key algorithm has some limitation in this paper. The distributed computing environment works with fault tolerance. As the case of distributed computing environment the bandwidth of the measurement feature can be more increased for the various systems. The Trusted Computing environment has the root of trust with the authentication protocol. The performance criteria of the system have to be further redesigned as a future work. Cloud as a technique is considered in this paper as an initial phase. The security mechanism to be further measured. The Efficiency Factor for the configuration measurement of all distributed system to be configured in the future. VIII. REFERENCES [1] Ronald Toegl, Thomas Winkler, Mohammad Nauman and Theodore W. Hong Specification and Standardization of a Java Trusted Computing API SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. Exper. 2011 Published online in Wiley Online Library (wileyonlinelibrary.com). [2] Yau, Stephen S , High Performance Computing and Communications (HPCC), 2011 IEEE 13th International Conference on 2-4 Sept. 2011.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 140-144 © IAEME 144 [3] Zhidong Shen, Qiang Tong ,The Security of Cloud Computing System enabled by Trusted Computing Technology, 2010 2nd International Conference on Signal Processing Systems (ICSPS) [4] Stueble C, Zaerin A. µTSS - a simplified trusted software stack. Proceedings of the 3rd International Conference on Trust and Trustworthy Computing (TRUST 2010), no. 6101 in LNCS, Springer Verlag, 2010. [5] C. Latze, U. Ultes-Nitsche, F. Baumgartner, Extensible Authentication Protocol Method for Trusted Computing Groups (TCG) Trusted Platform Modules, Work in Progress, 2009 [6] Pirker M, Toegl R, Hein D, Danner P. A Privacy CAfor anonymity and trust. Proc. Trust ’09, LNCS, Vol. 5471.Springer, 2009. [7] CHEN Xiaofeng and FENG Dengguo, Direct Anonymous Attestation for Next Generation TPM JOURNAL OF COMPUTERS, VOL.3, NO. 12, DECEMBER 2008. [8] Microsoft. TPM Base Services. Microsoft Developer Network, 2007. http://msdn.microsoft.com/en-us/library/ aa446796(VS.85).aspx [27 May 2011] [9] Tian Haibo, Wang Yumin The Future Network Security, China Communications August 2006. [10] M. Frans Kaashoek Barbara Liskov David Andersen Mike Dahlin Carla Ellis Steve Gribble Anthony Joseph Hank Levy Andrew Myers Jeff Mogul Ion Stoica Amin Vahdat, Report of the NSF Workshop on Research Challenges in Distributed Computer Systems, Dec 4 2005. [11] Claus Fritzner,Leif Nilsen And smund Skomedal , Protecting Security Information in DistributedSystems,GH2986891/0000/0245$01.00@1991 IEEE [12] Ernest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM Conference on Computer and Communications Security 2004: 132-145. [13] Elaine Shi, Adrian Perrig, Leendert Van Doorn BIND: A Fine-grained Attestation Service for Secure Distributed Systems. [14] Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in Cloud Computing”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [15] Abhishek Pandey, R.M.Tugnayat and A.K.Tiwari, “Data Security Framework for Cloud Computing Networks”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 1, 2013, pp. 178 - 181, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [16] A.Madhuri and T.V.Nagaraju, “Reliable Security in Cloud Computing Environment” International Journal of Information Technology and Management Information Systems (IJITMIS), Volume 4, Issue 2, 2013, pp. 23 - 30, ISSN Print: 0976 – 6405, ISSN Online: 0976 – 6413.