Author/Authors :
Huang,Chenlin School of Computer - National University of Defense Technology, Changsha, China , Hou, Chuanwang School of Computer - National University of Defense Technology, Changsha, China , Dai, Huadong School of Computer - National University of Defense Technology, Changsha, China , Ding, Yan School of Computer - National University of Defense Technology, Changsha, China , Fu, Songling College of Polytechnic - Hunan Normal University, Changsha, China , Ji , Mengluo Department of Computer and Information Engineering - Luoyang Institute of Science and Technology, Luoyang , China
Abstract :
Trusted computing aims to build a trusted computing environment for information systems with the help of secure hardware TPM, which has been proved to be an effective way against network security threats. However, the TPM chips are not yet widely deployed in most computing devices so far, thus limiting the applied scope of trusted computing technology. To solve the problem of lacking trusted hardware in existing computing platform, an alternative security hardware USBKey is introduced in this paper to simulate the basic functions of TPM and a new reverse USBKey-based integrity verification model is proposed to implement the reverse integrity verification of the operating system boot process, which can achieve the effect of trusted boot of the operating system in end systems without TPMs. A Linux operating system booting method based on reverse integrity verification is designed and implemented in this paper, with which the integrity of data and executable files in the operating system are verified and protected during the trusted boot process phase by phase. It implements the trusted boot of operation system without TPM and supports remote attestation of the platform. Enhanced by our method, the flexibility of the trusted computing technology is greatly improved and it is possible for trusted computing to be applied in large-scale computing environment.
Keywords :
Research , Linux Trusted Boot Method , Reverse Integrity Verification , USBKey , alternative security hardware