Skip to main content
Log in

Analysis of OSPU security effect and data assembly verification under semi-network OS architecture

  • Regular Contribution
  • Published:
International Journal of Information Security Aims and scope Submit manuscript

Abstract

This study attempts to provide a new security solution for data storage based on semi-network OS architecture, that is, to create a comprehensive data security system with approaches of “OSPU security effect” and “data assembly verification” as main pillars. There are three factors to determine the security level of data storage, they are: the uniqueness of verification credentials, the exclusiveness of network access, and the verifiability of the user’s identity, which are also the three weaknesses of some existing security configuration of data storage, the theme discussed here is trying to use the new comprehensive security configuration system to overcome some weaknesses of existing one and provide a more effective security environment for data storage. Currently, a large number of theories and approaches related to data security have emerged, including some latest “security hardware” and approaches of “data verification,” but few of them are similar to the OSPU security effect and the “data assembly verification” mentioned here, and further, it is an unprecedented innovation that combines approaches of OSPU security effect and the “data assembly verification” into a comprehensive security system under the semi-network OS architecture. OSPU is a core hardware component in semi-network OS architecture, and it performs both system support and security checkpoints in this study.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

Data availability

The results/data/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher. All of the material is owned by the authors and/or no permissions are required.

References

  1. Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. of the conference on computer and communications security, ser. CCS (2004)

  2. Champagne, D.: Scalable security architecture for trusted software. Ph.D. dissertation, Princeton University, Electrical engineering department, Princeton, NJ (2010)

  3. Franklin, J., Chaki, S., Datta, A., Seshadri, A.: Scalable parametric verification of secure systems: how to verify reference monitors without worrying about data structure size. In: Proc. of the symposium on security and privacy, ser. S&P (2010)

  4. Champagne, D., Lee, R.B.: Processor-based tailored attestation. Princeton University department of electrical engineering technical report (2010)

  5. Champagne, D., Lee, R.: Scalable architectural support for trusted software. In: Proc. of the Int. symposium on high performance computer architecture, ser. HPCA (2010)

  6. Chen, E.Y., Bau, J., Reis, C., Barth, A., Jackson, C.: App isolation: get the security of multiple browsers with just one. In: Proc. of the conf. on computer and communications security, ser. CCS (2011)

  7. Dill, D.L., Drexler, A.J., Hu, A.J., Yang, CH: Protocol verification as a hardware design aid. In: Proc. of the int. conference on computer design: VLSI in computer and processors, ser. ICCD (1992)

  8. Dwoskin J.S., Lee, R.B.: Hardware-rooted trust for secure key management and transient trust. In: Proc. of the conference on computer and communications security, ser. CCS (2007)

  9. Lie, D., Mitchell, J., Thekkath, C., Horowitz, M.: Specifying and verifying hardware for tamper-resistant software. In: Proc. of the symposium on security and privacy, ser. S&P (2003)

  10. Schellekens, D., Wyseur, B., Preneel, B.: Remote attestation on legacy operating systems with trusted platform modules. J. Sci. Comput. Program. 74(1–2), 13 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  11. Szefer, J., Lee, R.: A case for hardware protection of guest VMs from compromised hypervisors in cloud computing. In: Proc. of the workshop on security and privacy in cloud computing, ser. SPCC. (2011). https://ieeexplore.ieee.org/document/5961523

  12. Zhang, Y.S.: Applicability analysis of semi-network operating system. Comput. Inform. Sci. 12(1), 93–97 (2019). https://doi.org/10.5539/cis.v12n1p93

    Article  MathSciNet  Google Scholar 

  13. Zhang, Y.S.: Semi-network OS and new mode of application software sharing. J. Multidiscip. Eng. Sci. Technol. 6(5), 10083–10088 (2019)

    Google Scholar 

  14. Zhang, Y.S.: Semi-network OS and embedded OS for co-mobile computing. Int. J. Comput. Sci. Res 3(2), 189–198 (2019)

    Google Scholar 

  15. Zhang, Y.S.: data management system for ubiquitous multi-task mobile devices on semi-network OS architecture. Eur. J. Electric. Eng. Comput. Sci. (2020). https://doi.org/10.24018/ejece.2020.4.4.236

  16. Zhang, Y.S.: A fat client OS architecture supported by semi-network resources. Int. J. Comput. Sci. Res. 6, 857–876 (2022)

    Google Scholar 

  17. Dabbaghjamanesh, M., Kavousi-Fard, A., Dong, Z.Y.: A novel distributed cloud-fog based framework for energy management of networked microgrids. IEEE Trans. Power Syst. 35(4), 2847–2862 (2020)

    Article  Google Scholar 

  18. Sahba, Amin, Ramin Sahba, Paul Rad, and Mo Jamshidi: Optimized IoT based decision making for autonomous vehicles in intersections. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 0203–0206. IEEE, (2019) .https://ieeexplore.ieee.org/document/8992978

  19. Dehghani, M., Kavousi-Fard, A., Dabbaghjamanesh, M., Avatefipour, O.: Deep learning based method for false data injection attack detection in AC smart islands. IET Gener. Trans. Distrib. 14(24), 5756–5765 (2020). https://doi.org/10.1049/iet-gtd.2020.0391

    Article  Google Scholar 

  20. Sahba, Farshid, Amin Sahba, Ramin Sahba: Helping blind people in their meeting locations to find each other using RFID technology. arXiv preprint arXiv:1902.03558 (2019). https://arxiv.org/abs/1902.03558

  21. Sahba, Farshid, Amin Sahba, Ramin Sahba: Applying ad hoc technology in inner city communication. In: 2019 IEEE 10th annual ubiquitous computing, electronics and mobile communication conference (UEMCON), pp. 1194–1198. IEEE, (2019). https://ieeexplore.ieee.org/document/8992923

Download references

Funding

This study was not funded by any funders.

Author information

Authors and Affiliations

Authors

Contributions

I am the only author of this manuscript, and the results/data/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher.

Corresponding author

Correspondence to Yin Sheng Zhang.

Ethics declarations

Conflict of interests

I declare that I have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Y.S. Analysis of OSPU security effect and data assembly verification under semi-network OS architecture. Int. J. Inf. Secur. 22, 1497–1509 (2023). https://doi.org/10.1007/s10207-023-00702-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10207-023-00702-1

Keywords

Navigation