Skip to main content
Log in

A Peer-to-Peer resource sharing scheme using trusted computing technology

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Facing the increasing security issues in P2P networks, a scheme for resource sharing using trusted computing technologies is proposed in this paper. We advance a RS-UCON model with decision continuity and attribute mutability to control the usage process and an architecture to illustrate how TC technologies support policy enforcement with bidirectional attestation. The properties required for attestation should include not only integrity measurement value of platform and related application, but also reputation of users and access history, in order to avoid the limitation of the existing approaches. To make a permission, it is required to evaluate both the authorization and conditions of the subject and the object in resource usage to ensure trustable resources to be transferred to trusted users and platform.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chuang M, Phoomvuthisarn S, Joshi J B D. An Integrated Framework for Trust-Based Access Control for Open System[ C]// Proc of Collaborative Computing: Networking, Application and Worksharing. Atlanta: IEEE Press, 2006: 1.

    Google Scholar 

  2. Trusted Computing Group. TPM Main Part 1 Design Principles, Specification Version 1.2, Revision 94[EB/OL]. [2006-03-29]. https://www.trustedcomputinggroup.org.

  3. Barham P, Dragovic B, Fraser K, et al. Xen and the Art of Virtualization[C]//Proc of the 19th ACM Symposium on Operating Systems Principles. New York: ACM Press, 2003: 164.

    Google Scholar 

  4. Berger S, Caceres R., Goldman K A, et al. vTPM:Virtualizing the Trusted Platform Module[R]. New York: IBM Watson Research Center, 2006.

    Google Scholar 

  5. Park J, Sandhu R. The UCONABC Usage Control Model[J]. ACM Transactions on Information and Systems Security, 2004, 7(1): 128–174.

    Article  Google Scholar 

  6. Zhang Xinwen, Parisi-Presicce F, Sandhu R, et al. Formal Model and Policy Specification of Usage Control[J]. ACM Transactions on Information and Systems Security, 2005, 8(4): 351–387.

    Article  Google Scholar 

  7. Xu Min, Jiang Xuxian, Sandhu R, et al. Towards a VMM-based Usage Control Framework for OS Kernel Integrity Protection[C]// Proc of 12th ACM Symposium on Access Control Models and Technologies(SACMAT). Sophia Antipolis: ACM Press, 2007: 71.

    Google Scholar 

  8. Balfe S, Lakhani A D, Paterson K G. Trusted Computing: Providing Security for Peer-to-Peer Networks[C]//Proc of 5th IEEE International Conference on Peer-to-Peer Computing. London: IEEE Press, 2005: 117.

    Google Scholar 

  9. Bertino E, Ferrari E, Atluri V. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems[J]. ACM Transactions on Information and System Security, 1999, 2(1): 65–104.

    Article  Google Scholar 

  10. Wang Y, Vassileva J. Trust-Based Community Formation in Peer-to-Peer File Sharing Networks[C]//Proc of the IEEE/WIC/ACM International Conference on Web Intelligence. Washington D C: IEEE Press, 2004: 341.

    Chapter  Google Scholar 

  11. Sandhu R, Zhang Xinwen. Peer-to-Peer Access Control Architecture Using Trusted Computing Technology[C]// Proc of 10th ACM Symposium on Access Control Models and Technologies (SACMAT). Stockholm: ACM Press, 2005: 147.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huanguo Zhang.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60673071, 60743003, 90718005, 90718006) and the National High Technology Research and Development Program of China (2006AA01Z442, 2007AA01Z411)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chen, L., Zhang, H., Zhang, L. et al. A Peer-to-Peer resource sharing scheme using trusted computing technology. Wuhan Univ. J. Nat. Sci. 13, 523–527 (2008). https://doi.org/10.1007/s11859-008-0503-8

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0503-8

Key words

CLC number

Navigation