信息网络安全 ›› 2016, Vol. 16 ›› Issue (7): 78-84.doi: 10.3969/j.issn.1671-1122.2016.07.012

• • 上一篇    下一篇

基于可信计算基的主机可信安全体系结构研究

黄强, 常乐, 张德华, 汪伦伟   

  1. 信息保障技术重点实验室,北京 100072
  • 收稿日期:2016-04-15 出版日期:2016-07-20 发布日期:2020-05-13
  • 作者简介:

    作者简介: 黄强(1977—),男,湖南,工程师,博士,主要研究方向为信息安全;常乐(1975—),男,陕西,高级工程师,硕士,主要研究方向为信息技术与信息安全;张德华(1977—),男,山东,高级工程师,博士,主要研究方向为信息安全;汪伦伟(1976—),男,安徽,高级工程师,博士,主要研究方向为信息安全。

  • 基金资助:
    信息保障技术重点实验室开放基金[KJ-14-101]

Research on Trusted Security Host Architecture Based on Trusted Computing Base

Qiang HUANG, Le CHANG, Dehua ZHANG, Lunwei WANG   

  1. Information Assurance Technology Laboratory, Beijing 100072, China
  • Received:2016-04-15 Online:2016-07-20 Published:2020-05-13

摘要:

可信计算技术的深入应用,必须要解决与传统认证、加密、访问控制等安全机制的融合问题。文章通过研究构建主机可信/安全统一的安全体系结构,从主机安全体系结构研究背景以及为安全增强主机的设计出发,通过研究传统安全体系结构与可信计算体系结构的关系,并对国内外具有代表性的可信计算体系结构进行比较,分析了保护数据完整性和系统完整性上的主要区别。最后文章指出可信计算机制可以提升可信计算基的安全结构和保障。文章阐述了构建可信计算增强的主机安全体系结构的几个重要机制:结合可信认证机制的认证体系;结合可信计算机制的数据安全机制;结合可信运行控制与强制访问控制的可执行程序安全控制流程。

关键词: 安全体系结构, 可信计算, 可信计算基

Abstract:

Starting from the host computer security architecture studying background and the requirement of designing actual high-security computer, we discuss trusted & security union architecture here to fuse trusted computing mechanism with legacy security mechanism like access control or authentication. First, the relationship between trusted computing and legacy security architecture is discussed. The TCG architecture and China trusted computing architecture is also compared with their differences in data integrity and system integrity. At last, we make the conclusion that trusted computing mechanism can enhance the security architecture and assurance the TCB’s characters. Several critical mechanisms are discussed to help for realizing and supporting this architecture: authentication with trusted computing devices and other legacy methods, data protecting mechanism supported by trusted computing and file execution control mechanism combining trusted validation control and mandatory access control.

Key words: security architecture, trusted computing, trusted computing base

中图分类号: