TrustZone-based secret key use frequency management method and system in cloud storage mode

A management method and cloud storage technology, applied in transmission systems and key distribution, can solve the problems of fast and continuous update of TPM hardware counters, key leakage, performance degradation, etc., to improve portability, enhance security, and protect security. stored effect

Active Publication Date: 2021-04-20
WUHAN UNIV OF SCI & TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, its disadvantages are: firstly, the basis for realizing this method is the trusted platform module TPM, but the TPM is an external chip on the computer motherboard, and some user equipment may not have a TPM chip; secondly, it is subject to price and process and other factors, TPM only provides a small number of hardware counters, and the rapid and continuous update of TPM hardware counters will cause blocking and reduce program performance
Although this method solves the problem that the number of TPM hardware counters is small by using a virtual counter, each update operation to the virtual counter will still update the TPM hardware counter, and there is still a significant problem of performance degradation; third, in this method , the encryption and decryption of the data key is completed inside the TPM, but the use of the key to decrypt the ciphertext data from the cloud server is completed in the ordinary memory environment, and attacks from the operating system or programs with higher privileges may cause the key leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TrustZone-based secret key use frequency management method and system in cloud storage mode
  • TrustZone-based secret key use frequency management method and system in cloud storage mode
  • TrustZone-based secret key use frequency management method and system in cloud storage mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] The technical solutions of the present invention will be specifically described below in conjunction with the accompanying drawings and embodiments.

[0079] In consideration of the defects of the prior art, the present invention proposes to apply the TrustZone technology to key management and data processing in the cloud storage mode.

[0080] The present invention notes that the TrustZone technology is a hardware security extension technology proposed by ARM, which supports users to independently develop and design specific security systems, and is currently widely supported by mobile embedded devices. TrustZone technology divides the entire ARM SoC into two physically isolated execution areas through processor expansion: Normal World (NW) and Secure World (Secure World, SW), and controls NW through a secure monitor and SW switching. NW and SW have independent system resources, including registers, physical memory, and peripherals, but SW has a higher privilege level...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a TRUSTZONE-based secret key use frequency management method and system in a cloud storage mode, and the method comprises the steps: building a system environment which takes Linux as a common execution environment REE and takes OP-TEE as a trusted execution environment TEE at a data owner DO end and a data user DU end based on the TRUSTZONE technology, and enabling private information and related operations to be processed by a trusted application TA, processing other non-sensitive operations and files by a client application CA running in the REE, and the CA communicating with the TA through an API. In the aspect of secret key use, the secret key use frequency is bound with the safe file reading frequency, the secret key use frequency is subjected to safe storage and integrity verification to be prevented from being damaged, and it is ensured that the safety problem caused by unlimited use after secret key distribution is solved. In the cloud storage mode, the security storage of the secret key and the confidentiality of the file can be effectively ensured, the use frequency of the secret key by an authorized user is controlled and managed, and the situation that the confidentiality of the file is damaged due to unprotected and unlimited use of the secret key by the user is prevented.

Description

technical field [0001] The present invention relates to the technical field of computer information security, the main content is to manage the data encryption key based on TrustZone in the cloud storage mode, and use TrustZone to realize the safe storage of the key at the data user end and limit the number of times of use, thereby protecting the confidentiality of outsourced data sex. Background technique [0002] As an important part of cloud computing, cloud storage focuses on providing users with Internet-based online storage services. In the cloud storage mode, storage is a service. Users do not need to consider specific technical details such as the storage type and storage method of physical devices, data availability, reliability, etc., but can request from the cloud service provider (Cloud Service Provider, CSP) on demand. Get corresponding services and access your data anytime, anywhere. Cloud storage can bring opportunities in improving IT efficiency, cost savin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08
Inventor 任正伟李鑫陈小双李晓娟张凯
Owner WUHAN UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products