Abstract
This study attempts to provide a new security solution for data storage based on semi-network OS architecture, that is, to create a comprehensive data security system with approaches of “OSPU security effect” and “data assembly verification” as main pillars. There are three factors to determine the security level of data storage, they are: the uniqueness of verification credentials, the exclusiveness of network access, and the verifiability of the user’s identity, which are also the three weaknesses of some existing security configuration of data storage, the theme discussed here is trying to use the new comprehensive security configuration system to overcome some weaknesses of existing one and provide a more effective security environment for data storage. Currently, a large number of theories and approaches related to data security have emerged, including some latest “security hardware” and approaches of “data verification,” but few of them are similar to the OSPU security effect and the “data assembly verification” mentioned here, and further, it is an unprecedented innovation that combines approaches of OSPU security effect and the “data assembly verification” into a comprehensive security system under the semi-network OS architecture. OSPU is a core hardware component in semi-network OS architecture, and it performs both system support and security checkpoints in this study.
Similar content being viewed by others
Data availability
The results/data/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher. All of the material is owned by the authors and/or no permissions are required.
References
Brickell, E., Camenisch, J., Chen, L.: Direct anonymous attestation. In: Proc. of the conference on computer and communications security, ser. CCS (2004)
Champagne, D.: Scalable security architecture for trusted software. Ph.D. dissertation, Princeton University, Electrical engineering department, Princeton, NJ (2010)
Franklin, J., Chaki, S., Datta, A., Seshadri, A.: Scalable parametric verification of secure systems: how to verify reference monitors without worrying about data structure size. In: Proc. of the symposium on security and privacy, ser. S&P (2010)
Champagne, D., Lee, R.B.: Processor-based tailored attestation. Princeton University department of electrical engineering technical report (2010)
Champagne, D., Lee, R.: Scalable architectural support for trusted software. In: Proc. of the Int. symposium on high performance computer architecture, ser. HPCA (2010)
Chen, E.Y., Bau, J., Reis, C., Barth, A., Jackson, C.: App isolation: get the security of multiple browsers with just one. In: Proc. of the conf. on computer and communications security, ser. CCS (2011)
Dill, D.L., Drexler, A.J., Hu, A.J., Yang, CH: Protocol verification as a hardware design aid. In: Proc. of the int. conference on computer design: VLSI in computer and processors, ser. ICCD (1992)
Dwoskin J.S., Lee, R.B.: Hardware-rooted trust for secure key management and transient trust. In: Proc. of the conference on computer and communications security, ser. CCS (2007)
Lie, D., Mitchell, J., Thekkath, C., Horowitz, M.: Specifying and verifying hardware for tamper-resistant software. In: Proc. of the symposium on security and privacy, ser. S&P (2003)
Schellekens, D., Wyseur, B., Preneel, B.: Remote attestation on legacy operating systems with trusted platform modules. J. Sci. Comput. Program. 74(1–2), 13 (2008)
Szefer, J., Lee, R.: A case for hardware protection of guest VMs from compromised hypervisors in cloud computing. In: Proc. of the workshop on security and privacy in cloud computing, ser. SPCC. (2011). https://ieeexplore.ieee.org/document/5961523
Zhang, Y.S.: Applicability analysis of semi-network operating system. Comput. Inform. Sci. 12(1), 93–97 (2019). https://doi.org/10.5539/cis.v12n1p93
Zhang, Y.S.: Semi-network OS and new mode of application software sharing. J. Multidiscip. Eng. Sci. Technol. 6(5), 10083–10088 (2019)
Zhang, Y.S.: Semi-network OS and embedded OS for co-mobile computing. Int. J. Comput. Sci. Res 3(2), 189–198 (2019)
Zhang, Y.S.: data management system for ubiquitous multi-task mobile devices on semi-network OS architecture. Eur. J. Electric. Eng. Comput. Sci. (2020). https://doi.org/10.24018/ejece.2020.4.4.236
Zhang, Y.S.: A fat client OS architecture supported by semi-network resources. Int. J. Comput. Sci. Res. 6, 857–876 (2022)
Dabbaghjamanesh, M., Kavousi-Fard, A., Dong, Z.Y.: A novel distributed cloud-fog based framework for energy management of networked microgrids. IEEE Trans. Power Syst. 35(4), 2847–2862 (2020)
Sahba, Amin, Ramin Sahba, Paul Rad, and Mo Jamshidi: Optimized IoT based decision making for autonomous vehicles in intersections. In: 2019 IEEE 10th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), pp. 0203–0206. IEEE, (2019) .https://ieeexplore.ieee.org/document/8992978
Dehghani, M., Kavousi-Fard, A., Dabbaghjamanesh, M., Avatefipour, O.: Deep learning based method for false data injection attack detection in AC smart islands. IET Gener. Trans. Distrib. 14(24), 5756–5765 (2020). https://doi.org/10.1049/iet-gtd.2020.0391
Sahba, Farshid, Amin Sahba, Ramin Sahba: Helping blind people in their meeting locations to find each other using RFID technology. arXiv preprint arXiv:1902.03558 (2019). https://arxiv.org/abs/1902.03558
Sahba, Farshid, Amin Sahba, Ramin Sahba: Applying ad hoc technology in inner city communication. In: 2019 IEEE 10th annual ubiquitous computing, electronics and mobile communication conference (UEMCON), pp. 1194–1198. IEEE, (2019). https://ieeexplore.ieee.org/document/8992923
Funding
This study was not funded by any funders.
Author information
Authors and Affiliations
Contributions
I am the only author of this manuscript, and the results/data/figures in this manuscript have not been published elsewhere, nor are they under consideration by another publisher.
Corresponding author
Ethics declarations
Conflict of interests
I declare that I have no competing interests as defined by Springer, or other interests that might be perceived to influence the results and/or discussion reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Zhang, Y.S. Analysis of OSPU security effect and data assembly verification under semi-network OS architecture. Int. J. Inf. Secur. 22, 1497–1509 (2023). https://doi.org/10.1007/s10207-023-00702-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-023-00702-1