Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2014, Article ID 687158, 7 pages
Research Article

Property-Based Anonymous Attestation in Trusted Cloud Computing

1College of Computer Science, Beijing University of Technology, Beijing 100124, China
2School of Computer, National University of Defense Technology, Changsha 410073, China

Received 17 December 2013; Accepted 3 February 2014; Published 25 March 2014

Academic Editor: Weifeng Sun

Copyright © 2014 Zhen-Hu Ning et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. CCID, “White Paper of Chinese Cloud Computing Industry Development,”
  2. C.-L. Tsai and U.-C. Lin, “Information security of cloud computing for enterprises,” Advances in Information Sciences and Service Sciences, vol. 3, no. 1, pp. 132–142, 2011. View at Publisher · View at Google Scholar · View at Scopus
  3. W. Dawoud, I. Takouna, and C. Meinel, “Infrastructure as a service security: challenges and solutions,” in Proceedings of the 7th International Conference on Informatics and Systems (INFOS '10), pp. 1–8, March 2010. View at Scopus
  4. Microsoft Corporation, “Building a secure platform for trustworthy computing,” White Paper, Microsoft Corporation, 2002. View at Google Scholar
  5. N. Santos, K. P. Gummadi, and R. Rodrigues, “Towards trusted cloud computing,” in Proceedings of the USENIX Workshop on Hot Topics in Cloud Computing, San Diego, Calif, USA, 2009.
  6. C. Mundie, P. de Vries, P. Haynes, and M. Corwine, “Microsoft white paper on trustworthy computing,” Tech. Rep., Microsoft Corporation, 2002. View at Google Scholar
  7. K. Goldman, R. Sailer, D. Pendarakis, and D. Srinivasan, “Scalable integrity monitoring in virtualized environments,” in Proceedings of the 5th ACM Workshop on Scalable Trusted Computing (STC '10), pp. 73–78, Chicago, Ill, USA, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. D. Safford, “Clarifying misinformation on TCPA,” White Paper, IBM Research, 2002. View at Google Scholar
  9. D. Safford, “The need for TCPA,” White Paper, IBM Research, 2002. View at Google Scholar
  10. Trusted Computing Group, TPM Main Specification, Main Specification Version 1. 2 Rev. 85, Trusted Computing Group, 2005.
  11. Trusted Computing Platform Alliance, Main Specification, Version 1.1b, 2002.
  12. T. C. Group, “TCG software stack specification,” 2003,
  13. Trusted Computing Group, “TCG specification architecture overview, Specification Revision 1. 4,” 2007.
  14. Trusted Computing Group, “Trusted computing platform alliance (TCPA) main specification, Version 1. 1a. Republished as Trusted Computing Group (TCG) main specification, Version 1. 1b,” 2001,
  15. E. Brickell, J. Camenisch, and L. Chen, “Direct anonymous attestation,” in Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS '04), pp. 132–145, ACM, Washington, DC, USA, October 2004. View at Scopus
  16. Trusted Computing Group, “TPM main specification, main specification Version 112 revision 94,” 2006,
  17. A.-R. Sadeghi and C. Stüble, “Property-based attestation for computing platforms: caring about properties, not mechanisms,” in Proceedings of the New Security Paradigms Workshop, pp. 67–77, Virginia Beach, Va, USA, September 2004. View at Scopus
  18. L. Chen, R. Landfermann, H. Löhr, M. Rohe, A.-R. Sadeghi, and C. Stüble, “A protocol for property-based attestation,” in Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, pp. 7–16, Alexandria, Va, USA, November 2006. View at Publisher · View at Google Scholar · View at Scopus
  19. D. J. Luo, “Efficient certificatieless anonymous attestation to trusted cloud coputing platforms,” International Journal of Advancements in Computing Technology, vol. 4, no. 17, 2012. View at Google Scholar
  20. D. Boneh, C. Gentry, B. Lynn et al., “Aggregate and verifiably encrypted signatures from Bilinear maps,” in Advances in Cryptology: Proceedings of Enrocrypt, pp. 416–432, Springer, Heidelberg, Germany, 2003. View at Google Scholar
  21. M. Burrows, M. Abadi, and R. Needham, “Logic of authentication,” ACM Transactions on Computer Systems, vol. 8, no. 1, pp. 18–36, 1990. View at Publisher · View at Google Scholar · View at Scopus