计算机科学与探索 ›› 2015, Vol. 9 ›› Issue (8): 954-962.DOI: 10.3778/j.issn.1673-9418.1409077

• 网络与信息安全 • 上一篇    下一篇

基于可信计算的使用控制实施方案

翟  翔1,2+,贺也平2   

  1. 1. 中国科学院大学, 北京 100190
    2. 中国科学院 软件研究所,北京 100190
  • 出版日期:2015-08-01 发布日期:2015-08-06

Approach of Usage Control Enforcement Based on Trusted Computing

ZHAI Xiang1,2+, HE Yeping2   

  1. 1. University of Chinese Academy of Sciences, Beijing 100190, China
    2. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
  • Online:2015-08-01 Published:2015-08-06

摘要: 针对访问的持续性保护问题,使用控制模型可以加强对传统模型的访问控制。已有的使用控制系统研究中,利用可信计算技术保证访问控制策略的正确实施。该类工作存在的问题是,对使用控制模型的决策连续特性支持不足。提出了新型的可信使用控制架构,持续监控系统变化,在使用过程中控制客体资源,有效支持决策连续性。提出了一种基于模型的行为证明方案,利用可信芯片TCM(trusted cryptography module)作为信任根,度量使用控制架构的动态行为,确保策略有效实施,并在操作系统内核中实现了该可信使用控制架构。通过实验评估,使用控制系统支持决策连续性并能及时发现攻击行为,是一种有效的可信使用控制的解决方案。

关键词: 可信计算, 使用控制, 决策持续性, 远程证明

Abstract: Usage control (UCON) model enhances traditional access control models by continuous protection of object access. The researches on usage control enforcement mechanism leverage trusted computing techniques to ensure that the enforcement of policy is trusted. But these researches have problems that they lack the support of decision continuity. This paper proposes a novel architecture of trusted usage control system, which supports decision continuity by monitoring system changes continuously and controlling object resources during usage period. This paper also proposes a behavior attestation method to measure the dynamic behavior of usage control system on purpose of ensuring the trustworthy of policy enforcement by leveraging TCM (trusted cryptography module). Finally, this paper builds a system in operation system kernel to control the usage of files. The evaluation shows that the proposed model is feasible to support continuity of access decision evaluation and detect violation.

Key words: trusted computing, usage control, decision continuity, remote attestation