Paper
5 May 2022 A trusted remote attestation protocol based on attributes for containerized virtual network functions
Songhui Guo, Dazan Qian, Lei Sun, YunFan Song, Miao Wang, Miao Yu
Author Affiliations +
Proceedings Volume 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022); 1224504 (2022) https://doi.org/10.1117/12.2635843
Event: International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 2022, Sanya, China
Abstract
The virtual network function carried by the container has the advantages of strong orchestration ability and high flexibility. However, due to the poor natural isolation of the container, the security of the containerized virtual network function has attracted much attention. After trusted measurement of containerized virtual network functions based on trusted computing, how to reduce the privacy exposure of containerized virtual network functions under the premise of effective response to challengers has become an urgent problem to be solved. This paper proposes a trusted remote attestation protocol based on attribute certificates and ciphertext policy attribute-based encryption for containerized virtual network function, and uses Ban logic to perform inference analysis on this protocol. The results prove that the proposed is correct and can meet the expected goals.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Songhui Guo, Dazan Qian, Lei Sun, YunFan Song, Miao Wang, and Miao Yu "A trusted remote attestation protocol based on attributes for containerized virtual network functions", Proc. SPIE 12245, International Conference on Cryptography, Network Security, and Communication Technology (CNSCT 2022), 1224504 (5 May 2022); https://doi.org/10.1117/12.2635843
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Logic

Clouds

Computer security

Network security

Back to Top