Securing the Distributions in P2P Networks with Trusted Platform Modules

Full Text (PDF, 602KB), PP.26-33

Views: 0 Downloads: 0

Author(s)

Hao Li 1,* Yu Qin 1 Qianying Zhang 1 Shijun Zhao 1

1. State Key Laboratory of Information Security/Institute of Software/Chinese Academy of Sciences, Beijing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2011.02.04

Received: 3 Aug. 2010 / Revised: 2 Nov. 2010 / Accepted: 16 Jan. 2011 / Published: 8 Mar. 2011

Index Terms

Trusted Computing, peer-to-peer, TPM, redistribution, n-time-use digital content

Abstract

We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution includes three protocols (distribution protocol, usage protocol, redistribution protocol) which are all based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.

Cite This Paper

Hao Li, Yu Qin, Qianying Zhang, Shijun Zhao, "Securing the Distributions in P2P Networks with Trusted Platform Modules", International Journal of Computer Network and Information Security(IJCNIS), vol.3, no.2, pp.26-33, 2011. DOI:10.5815/ijcnis.2011.02.04

Reference

[1]Sailer R, Zhange XL, Jaeger T, and Doorn LV. Design and implementation of a TCG-based integrity measurement architecture. //Proceedings of the 13th USENIX Security Symposium, San Diego, 2004. San Diego: USENIX Security Symposium, 2004: 223-238
[2]Alam M, Seifert MP, Li Q, Zhang XW. Usage control platformization via trustworthy SELinux. //Proc. of the 2008 ACM symposium on Information, computer and communications security (ASIACCS), Tokyo, 2008. Tokyo: ACM Press, 2008: 245-248.
[3]X. Chu and Y. Qin. A Distributed Usage Control System Based on Trusted Computing. In Proc. of 1st Trust Computing Theory and Practice Conference, 2009.
[4]D. S. Kyle and J. C. Brustoloni. UCLinux: a Linux Security Module for Trusted-Computing-based Usage Controls Enforcement. In Proc. of 2nd ACM Workshop on Scalable Trusted Computing, 2007.
[5]Li Hao and Hu Hao. UCFS: Building a Usage Controlled File System with a Trusted Platform Module. In Proc. of 1st Trust Computing Theory and Practice Conference, 2009.
[6]X. Zhang and J.-P. Seifert. Security Enforcement Model for Distributed Usage Control. In IEEE International Conference on Sensor Networks, 2008.
[7]J. Park and R. Sandhu. The UCONabc usage control model. ACM Transactions on Information and Systems Security, 7(1):128–174, February 2004.
[8]A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Communications of the ACM, (9):39–44, 2006.
[9]S. E. Schechter, R. A. Greenstadt, and M. D. Smith, Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment, The Second Annual Workshop on Economics and Information Security (EIS’03). College Park, Maryland, May 29-30, 2003.
[10]R. Sandhu and X. Zhang, Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: SACMAT 2005, Stockholm, Sweden (June 2005)
[11]P. E. Sevinc, M. Strasser, and D. Basin. Securing the distribution and storage of secrets with trusted platform modules. In WISTP 2007, pages 53–66, 2007.
[12]A. Osterhues, A. R. Sadeghi, M. Wolf, C. Stuble, and N. Asokan. Securing Peer-to-peer Distributions for Mobile Devices. In 4th Information Security Practice and Experience Conference, 2008.
[13]Trusted Computing Group: TCG architecture overview. (TCG Specification)
[14]Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification)
[15]L.F.G. Sarmenta, M. van Dijk, C.W. O'Donnell, J. Rhodes and S. Devadas. Virtual Monotonic Counters and Count-limited Objects using a TPM without a Trusted OS. 1st ACM Workshop on Scalable Trusted Computing (ACM STC '06). Held at CCS '06, Fairfax, VA, Nov. 2006
[16]L.F.G. Sarmenta, M. van Dijk, J. Rhodes and S. Devadas, Offline Count-Limited Certificates, ACM Symposium on Applied Computing (SAC 2008) Security Track, Fortaleza, Brazil, March 2008.
[17]M. van Dijk, J. Rhodes, L.F.G. Sarmenta, and S. Devadas, Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks, The 2nd ACM Workshop on Scalable Trusted Computing (ACM STC'07). Held at CCS '07, Alexandria, VA, Nov. 2007.