학술논문

Trusted Embedded Attestation Storage Scheme and System
Document Type
Conference
Source
2023 3rd International Conference on Electronic Information Engineering and Computer Science (EIECS) Electronic Information Engineering and Computer Science (EIECS), 2023 3rd International Conference on. :16-23 Sep, 2023
Subject
Communication, Networking and Broadcast Technologies
Computing and Processing
Robotics and Control Systems
Signal Processing and Analysis
Access control
Memory
Data protection
Encryption
Security
Secure storage
Testing
embedded devices
trusted cryptographic modules
secure storage services
remote attestation
attestation storage
Language
Abstract
At present, embedded devices are widely used in many fields such as industrial and agricultural production, social services, etc.. The application of embedded devices has become explosive growth momentum. Some low-end embedded devices have limited computing, memory and other resources, and embedded device hardware differences, a variety of system implementations, so the data storage security issues for massive embedded device have become more and more important. However, there are still some computing and storage devices that lack data protection modules or have weak data protection capabilities. Therefore, in this paper, we design and implement attestation storage method for an embedded devices based on TCM hardware security module. The trusted embedded device with TCM provides trusted and secure storage service for the host, and establishes a remote attestation mechanism and access control mechanism based on it to realize the security authentication between the trusted embedded device and the host, as well as the further establishment of a secure communication channel. This paper implements and evaluates the performance of the functional modules of attestation storage based on an embedded hardware platform. our secure storage service has excellent data transfer rate and low time overhead caused by the remote attestation between the host and the trusted embedded device, meanwhile, it has high security, which can effectively satisfy the data storage security requirements in general embedded application scenarios.