Dissertation > Excellent graduate degree dissertation topics show

The Research and Implementation of Trusted Security Enchancement System Based on USBKey

Author: RuanHongSheng
Tutor: LuoJun
School: National University of Defense Science and Technology
Course: Software Engineering
Keywords: Security enhancement Trusted computing USBKey Trust chain Disk encryption
CLC: TP393.08
Type: Master's thesis
Year: 2010
Downloads: 61
Quote: 0
Read: Download Dissertation


With the security problems frequently happen in computer systems, especially in terminal computer systems, information systems are confronted with the serious crisis of trust. To address these pressing problems thoroughly, it is necessary to establish a credible computing environment in architecture, The traditional security enhanced technology based on operating system is an efficient solution to resolve the security problem, but it can not guarantee that the base of the system is trustworthy. The technology of trusted computing platform introduces Trusted Platform Module(TPM) as a trust root. By passing the trust from trust root to other parts of the platform, TPM ensures the trust of computing platform and applications, and enhances the security of the terminal platform. However, to acquire a variety of security features defined by TCG, the support from hardware platform is needed. Furthermore, trusted booting process defined by TCG does not support the authentication of terminal user.To overcome these shortages, in this paper we combine trusted mechanism with security capability, and propose a trusted security enhancement architecture based on USBKey for general systems, which achieves the main functions of the TCG specification. We design a trusted booting scheme based on USBKey for linux, which not only implement the secure booting function but also provide security service for the upper applications and reasonably solved the problem of trusted environment for general systems.In this paper, we first introduce the requirement of trusted security enhancement and basic situations of this work, and research the traditional security enhancement technology and trusted operating system, and analyze the relationship of trust and security along with trusted booting technology, which provides abundantly academic and technical background.Secondly, we propose a trusted security enhancement architecture based on USBKey, and establish a comprehensive security architecture from the overall of security system based on the research achievement of current security OS.And then, we carry out similar TPM functions using USBKey, and propose a compatible trust chain which regards USBKey an BIOS as the trust root. View of the current terminal can not safely validate the legality of user, implemented the boot authentication based on USBKey; validate the trust of the OS loader, OS kernel and Init, to ensure the integrity of all parts in the booting process.Finally, according to independent privacy and offline privacy requirements, we propose disk encryption based on USBKey, which ensures the implementation of confidentiality policy and ciphertext to be stored. At the same time we provide trusted support for establishing terminal security environment in Linux.

Related Dissertations

  1. Design and Implementation of Windows Kernel-mode Cryptographic Service Interface,TP309.7
  2. Design and Implementation of Secured Network Hard Disk System Based on USBKey Authentication,TP393.08
  3. Research and Implementation of Electronic Signature Based on USBKey System,TP309
  4. Design and Implementation of a Bytecode-based Software Monitoring and Trusted Evolution Framework,TP311.52
  5. Udisk trust chain dynamic tracking technology research and implementation,TP309
  6. Design and Realization of Security Email System Based on PKI and USBKEY Technology,TP393.098
  7. Based on Trusted Computing intranet information security research,TP393.08
  8. TCG Software Stack (TSS) Specification Analysis and Implementation,TP309
  9. Research and Implementation of Unified Platform for Enterprise User Authentication,TP393.08
  10. TCM system design of the cryptographic algorithm IP,TP309.7
  11. PKI-based application programming interface research and application,TP393.08
  12. Research and Application of the Trusted Anonymous Attestation,TP309
  13. Grid-based deployment of virtual machines credible,TP393.08
  14. The Analysis and Research of USBKEY in PKI System Structure,TP393.08
  15. Research on Application of Secrecy-involved Terminal Based on Trusted Computing Platform,TP309
  16. Research on Host Sectrity in Intranet Security Management System,TP393.08
  17. Anonymous communication system theory and applied research,TN914
  18. CA trust digital certificates cross- technology research,TP393.08
  19. Portable Authentication Based on Trusted Computing,TN929.5
  20. Study on the User Behabioral Trust in Multi-layer Distributed Network System,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile