|本期目录/Table of Contents|

[1]郑赞红.基于Linux的可信计算系统的设计与实现[J].电子设计工程,2019,27(22):74-78.
 ZHENG Zanhong.Design and implementation of trusted computing system based on Linux[J].SAMSON,2019,27(22):74-78.
点击复制

基于Linux的可信计算系统的设计与实现(PDF)
分享到:

《电子设计工程》[ISSN:1674-6236/CN:61-1477/TN]

卷:
27
期数:
2019年22期
页码:
74-78
栏目:
计算机技术应用
出版日期:
2019-11-20

文章信息/Info

Title:
Design and implementation of trusted computing system based on Linux
文章编号:
1674-6236(2019)22-0074-05
作者:
郑赞红
(广东海洋大学 广东 湛江 524088)
Author(s):
ZHENG Zan?hong
(Guangdong Ocean University, Zhanjiang 524088, China)
关键词:
Linux 可信计算 贝叶斯网络 层次分析法 网络安全 客户端 服务器 终端
Keywords:
Linux trusted computing Bayesian network analytic hierarchy process network security client server terminal
分类号:
TP309
DOI:
-
文献标志码:
A
摘要:
针对内网资源的互联共通和共享,导致信息安全和信息网络化的矛盾日益突出的问题,文中设计和实现了一种基于linux的可信计算系统。该系统采用客户端/服务器的设计架构能根据终端的状态对终端进行认证,并能通过分析接入终端的软件行为和硬件资源对终端进行监控。该系统以层次分析法为基础,并为适应系统内网的状态变化引入贝叶斯网络模型进行可信度量化计算,使整个模型具有自动更新的能力。系统测试结果表明,文中所提出系统具有更好的针对性,对终端的完整性验证更有效。
Abstract:
Aiming Aiming at the common problem of interconnected and shared intranet resources, which leads to the increasingly prominent contradiction between information security and information network, a linux-based trusted computing system is designed and implemented. The system adopts a client/server design architecture to authenticate the terminal according to the state of the terminal, and can monitor the terminal by analyzing the software behavior and hardware resources of the access terminal. The system is based on the analytic hierarchy process, and introduces the Bayesian network model to adapt to the state change of the intranet. The trust model is calculated and the whole model has the ability to update automatically. The system test results show that the proposed system has better pertinence and is more effective for terminal integrity verification.

参考文献/References:

[1] 黄强,王高剑,米文智,等.集中统-的可信计算平台管理模型研究及其应用[J].信息网络安全,2017(4):9-14.[2] 孙帅,李传玺.基于Linux多线程管理的分析与实现[J].电子科技,2017,30(9):27-29.[3] 张朝元,邵高平,汪洋.基于Zynq-7000的嵌入式Linux移植[J].电子科技,2018(1):9-11.[4] 王勇,尚文利,赵剑明,等.基于TPM的嵌入式可信计算平台设计[J].计算机工程与应用,2018, 54(13):105-110.[5] 阎林,张建标,张艾.基于通用智能卡的可信引导方案[J].北京工业大学学报,2017,43(1):100-107.[6] 蒋华,闫一凡,鞠磊.可信服务链安全架构研究[J]. 计算机应用研究,2018,35(4):1159-1164.[7] 刘晓坦,李晓雯,崔翔.基于可信计算的多级安全策略研究[J].电子设计工程,2016,24(7):148-150.[8] 赵辉,秦维佳.Windows、Linux和TCP/IP中Timer的实现机制[J].沈阳工业大学学报,2001(S1):53-56.[9] 罗彩君.基于Linux系统的网络安全策略研究[J].电子设计工程,2013,21(17):50-52.[10]王天昊,贺亚龙.基于Linux的串口服务器设计与实现[J].电子科技,2017,30(6):105-108.[11]王俊,刘树波,梁才,等.基于PUF和IPI的可穿戴设备双因子认证协议[J].通信学报,2017,38(6):127-135.[12]Chernov A Y,Konoplev A S,Reshetov D V.The task of building a trusted computing environment on the Intel hardware platform[J].Automatic Control and Computer Sciences,2017,51(8):844-847.[13]Xu G,Tang Y,Yan Z,et al.TIM: A trust insurance mechanism for network function virtualization based on trusted computing[C]// Cham:International Conference on Security,Springer,2017.[14]汪润,王丽娜,唐奔宵,等.SPRD:基于应用UI和程序依赖图的Android重打包应用快速检测方法[J].通信学报,2018(4):56-70.[15]王勇,张雨菡,洪智,等.基于TPM2.0的内核完整性度量框架[J].计算机工程,2018,44(3):67-70.[16]Maene P,Gotzfried J,Clercq R D,et al. Hardware-based trusted computing architectures for isolation and attestation[J].IEEE Transactions on Computers,2018,67(3):361-374.[17]Kunlun G,Zhihao W,Ningyu A N,et al. Construction of the immune system of cyber security for electric power supervise and control system based on trusted computing[J].Advanced Engineering Sciences,2017(3):33-40.[18]Lauer H,Kuntze N.Hypervisor-based attestation of virtual environments[C]// Korea:Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing,Internet of People, & Smart World Congress,2017.[19]Shepherd C,Akram R N,Markantonakis K. Towards trusted execution of multi-modal continuous authentication schemes[C]// Las Vegas:Symposium on Applied Computing,2017.[20]李佳亮.基于贝叶斯网络推理算法的故障注入技术应用[J].自动化与仪器仪表,2016(7):190-191,194.[21]付永平,胡勇. 基于贝叶斯网络的个性化关联推荐模型研究 [J]. 重庆师范大学学报:自然科学版,2016(5):96-100.[22]郑健,冯亚娟,郭伟.基于贝叶斯网络的大学生考研动机影响因素 [J]. 西安工程大学学报,2015(6): 780-784.

相似文献/References:

[1]李贵盼,陈戈珩,邢志尧.基于MIPS64的嵌入式Linux Bootloader的移植[J].电子设计工程,2008,(08):19.
 LI Gui-pan,CHEN Ge-heng,XING Zhi-yao.Porting of Bootloader based on MIPS64 in embedded Linux[J].SAMSON,2008,(22):19.
[2]崔峰,蔡尧,王新梅.基于Linux的进程管理分析[J].电子设计工程,2007,(09):24.
 CUI Feng,CAI Yao,WANG Xin-mei.Study on process management based on Linux[J].SAMSON,2007,(22):24.
[3]龙再川,赵凯生,洪明坚,等.ARM系统中DMA方式在数据采集中的应用[J].电子设计工程,2007,(02):66.
 LONG Zai-Chuan,?ZHAO Kai-sheng,HONG Ming-jian,et al.Application of ARM system’s DMA in data acquisition[J].SAMSON,2007,(22):66.
[4]徐柳茂,黄永强,蒋念东,等.嵌入式Linux中I2C驱动程序的应用设计[J].电子设计工程,2007,(02):21.
 XU Liu-mao,Hang Yong-qiang,JIANG Nian-dong,et al.Application design for driver of I2C device based on embedded Linux[J].SAMSON,2007,(22):21.
[5]王立平,王新梅.Linux环境下基于I2C总线的EEPROM驱动程序[J].电子设计工程,2007,(01):4.
 WANG Li-ping,WANG Xin-mei.Design of EEPROM driver based on I2C-Bus under Linux[J].SAMSON,2007,(22):4.
[6]杨建平,张崇巍.MCF5282的I2C总线在uClinux操作系统下的驱动程序设计[J].电子设计工程,2006,(12):52.
 YANG Jian-ping,?ZHANG Chong-wei.Driver design of MCF5282 I2C Bus used in uClinux operation system[J].SAMSON,2006,(22):52.
[7]孙文康,段义隆,张媛媛.嵌入式Linux 下ARM处理器与DSP的数据通信[J].电子设计工程,2005,(09):14.
[8]吴江标,李嵩斌,杨瑞娟,等.基于S3C44B0X的嵌入式Socket通信设计[J].电子设计工程,2005,(05):7.
[9]高建华,王殊.基于S3C2410型微处理器和UDA1341型立体声音频编解码器的嵌入式音频系统设计[J].电子设计工程,2006,(06):35.
[10]郝艳杰,胡荣强,唐盛.μClinux下SDRAM数据交换区的生成和使用[J].电子设计工程,2005,(10):60.

备注/Memo

备注/Memo:
收稿日期:2019-03-26 稿件编号:201903185作者简介:郑赞红(1976—),女,广东湛江人,硕士,讲师。研究方向:数据库技术应用、网络管理与安全。
更新日期/Last Update: 2019-11-25