Abstract
This paper proposes a security enhancement scheme for disaster tolerant system based on trusted computing technology which combines with the idea of distributed threshold storage. This scheme takes advantage of trusted computing platform with trusted computing module, which is provided with such excellent features as security storage, remote attestation, and so on. Those features effectively ensure trustworthiness of disaster tolerant point. Furthermore, distributed storage based on Erasure code not only disposes the storage problem about a great deal of data, but also preferably avoids one node invalidation, alleviates network load and deals with joint cheat and many other security problems. Consequently, those security enhancement technologies provide mass data with global security protection during the course of disaster tolerance.
Similar content being viewed by others
References
Lawler CM, Harper M A, Thornton M A. Components and Analysis of Disaster Tolerant Computing [C] // IEEE International Performance Computing and Communications Conference(IPCCC 2007). New York: IEEE Press, 2007: 380–386.
Peng Rong, Cui Jingsong. Distributed Secure File System Based on Error Correcting Code [J]. Computer Engineering, 2005, 31(7): 7–8 (Ch).
Pitcher C, Riely J. Dynamic Policy Discovery with Remote Attestation [J]. Lecture Notes in Computer Science (LNCS), 2006, 3921: 111–125.
Burrows M, Abadi M, Needham R. A Logic of Authentication [J]. Operating System Review, 1989, 23(5): 1–13.
Miller S P, Neuman B C, Schiller J I, et al. Kerberos Authentication and Authorization System [R]. Cambridge: Massachusetts Institute of Technology. Project Athena Technical Plan OWL Section E.2.1, 1988.
Trusted Computing Group. TCG Trusted Network Connect Architecture for Interoperability V1.2 [EB/OL]. [2007-05-20]. https://www. trustedcomputing -group.org/groups/network.
Shamir A. How to Share a Secret [J]. Communications of the ACM(CACM), 1979, 22(11): 612–613.
Blakley G R. Safeguarding Cryptographic Keys [C] // The AFIPS National Computer Conference. New York: American Federation of Information Processing Societies Press, 1979: 313–317.
Feldman P. A Practical Scheme for Non-Interactive Verifiable Secret Sharing [C] // The 28th IEEE Annual Symposium on Foundations of Computer Science. Oakland: IEEE Computer Society, 1987: 427–437.
Laih C S, Harn L, Lee J Y, et a1. Dynamic Threshold Scheme Based on the Definition of Cross-Product in a N-Dimensional Liner Space[J]. Lecture Notes in Computer Science (LNCS), 1990, 435: 286–298.
Zhang Futai, Zhao Fuxiang, Wang Yumin. Verifiable Secret Sharing and Its Applications [J]. Chinese Journal of Electronics, 2002, 30(10): 1519–1525(Ch).
Huang Dongping, Wang Huayong, Huang Liansheng, et al. Dynamic Threshold Secret Sharing Scheme [J]. Journal of Tsinghua University (Science and Technology), 2006, 46(1): 102–105(Ch).
Mu Jianjun, Lu Chengye, Wang Xinmei. Research and Development on Erasure Codes [J]. Journal of Electronics and Information Technology, 2002, 24(9): 1276–1281.
Deswarte Y, Fabre J C, Fray J M, et al. SATURNE: A Distributed Computing System which Tolerates Faults and Intrusions[C] //Workshop on Future Trends of Distributed Computing Systems in the 1990s.Washington D C: IEEE Computer Society Press, 1988: 329–338.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation Items: Supported by the National High Technology Research and Development Program of China (863 Program) (2008AA01Z404), the Science and Technical Key Project of Ministry of Education (108087) and the Scientific and Technological Project of Wuhan City (200810321130)
Rights and permissions
About this article
Cite this article
Yu, R., Wang, L., Wang, D. et al. Study on security enhancement technology for disaster tolerant system. Wuhan Univ. J. Nat. Sci. 14, 19–23 (2009). https://doi.org/10.1007/s11859-009-0105-0
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-009-0105-0