Securing Peer-to-Peer Distributions with Trusted Platform Modules

Full Text (PDF, 289KB), PP.1-7

Views: 0 Downloads: 0

Author(s)

Hao Li 1,* Yu Qin 1 Qianying Zhang 1 Shijun Zhao 1

1. Institute of Software Chinese Academy of Sciences, Beijing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijwmt.2012.04.01

Received: 20 Apr. 2012 / Revised: 6 Jun. 2012 / Accepted: 11 Jul. 2012 / Published: 15 Aug. 2012

Index Terms

Trusted Computing, TPM, peer-to-peer, redistribution, n-time-use digital content

Abstract

We present a novel solution that allows one platform to securely distribute or redistribute digital contents to another in P2P networks. The solution is based on platforms with Trusted Platform Modules (TPMs). It maintains the confidentiality and freshness of digital contents during the processes of distribution. Given an ideal (tamper-proof) trusted platform, the solution can even withstand attacks by dishonest users during the processes of usage. Moreover, it can also be used to redistribute n-time-use digital content offline, so it is more flexible and scalable than other related distribution solutions to enable widespread deployment. Lastly, by adding a few simple features to TPMs, our solution can easily prevent the malicious sender and receiver from colluding when the redistribution takes place, so we can ensure that they can not gain more than a previously defined amount of rights without contacting the content provider.

Cite This Paper

Hao Li,Yu Qin,Qianying Zhang,Shijun Zhao,"Securing Peer-to-Peer Distributions with Trusted Platform Modules", IJWMT, vol.2, no.4, pp.1-7, 2012. DOI: 10.5815/ijwmt.2012. 04.01 

Reference

[1]Sailer R, Zhange XL, Jaeger T, and Doorn LV. Design and implementation of a TCG-based integrity measurement architecture. //Proceedings of the 13th USENIX Security Symposium, San Diego, 2004. San Diego: USENIX Security Symposium, 2004: 223-238

[2]Alam M, Seifert MP, Li Q, Zhang XW. Usage control platformization via trustworthy SELinux. //Proc. of the 2008 ACM symposium on Information, computer and communications security (ASIACCS), Tokyo, 2008. Tokyo: ACM Press, 2008: 245-248.

[3]X. Chu and Y. Qin. A Distributed Usage Control System Based on Trusted Computing. In Proc. of 1st Trust Computing Theory and Practice Conference, 2009.

[4]D. S. Kyle and J. C. Brustoloni. UCLinux: a Linux Security Module for Trusted-Computing-based Usage Controls Enforcement. In Proc. of 2nd ACM Workshop on Scalable Trusted Computing, 2007.

[5]Li Hao and Hu Hao. UCFS: Building a Usage Controlled File System with a Trusted Platform Module. In Proc. of 1st Trust Computing Theory and Practice Conference, 2009.

[6]X. Zhang and J.-P. Seifert. Security Enforcement Model for Distributed Usage Control. In IEEE International Conference on Sensor Networks, 2008.

[7]S. E. Schechter, R. A. Greenstadt, and M. D. Smith, Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment, The Second Annual Workshop on Economics and Information Security (EIS’03). College Park, Maryland, May 29-30, 2003.

[8]R. Sandhu and X. Zhang, Peer-to-Peer Access Control Architecture Using Trusted Computing Technology. In: SACMAT 2005, Stockholm, Sweden (June 2005)

[9]P. E. Sevinc, M. Strasser, and D. Basin. Securing the distribution and storage of secrets with trusted platform modules. In WISTP 2007, pages 53–66, 2007.

[10]A. Osterhues, A. R. Sadeghi, M. Wolf, C. Stuble, and N. Asokan. Securing Peer-to-peer Distributions for Mobile Devices. In 4th Information Security Practice and Experience Conference, 2008.

[11]Trusted Computing Group: TCG architecture overview. (TCG Specification)

[12]Trusted Computing Group: TCG TPM specification version 1.2. (TCG Specification)