Professional Documents
Culture Documents
1242
1243
TPM
Distributed
Environment
DAA
A connectstoB
Computer
B
,,
FIG1:REMOTE
CONNECTION
B.Algorithm Explanation
The proposed algorithm first allows the user to
login to the system. It then checks for the intruders. If
intruders try to access the information it will not
permit to proceed. Again it will check for the
authorization of the user. After checking the system
will allocate space in distributed shared memory and
also it grants permission from windows management
instrumentation. The information tobe accessed by the
user should not exceed the fixed size. The encrypted
data stored in the server will check for the Machine
Authentication Code before it allows to access the
information.
V. ROLE OF DAA IN DISTRIBUTED
COMPUTING ENVIRONMENT
Direct Anonymous Attestation (DAA) is a scheme
developed by Brickell, Camenisch, and Chen [12] for
remote authentication of a security hardware module
called Trusted Platform Module (TPM) which is the
core component of trusted computing platform [7].
The remote authenticity can be verified using security
in Windows Management Instrumentation (WMI).
The Distributed Component Object Model handles
remote calls for Trusted Attestation Key. TAK plays
a major role in designing the verifier and signer
authenticity. The password based authentication can
be generated as an anonymous permission to all
authenticated users. Distributed Environment has the
capacity of Fault Tolerance rather than network
operating environment [6 & 8]. In distributed
environment the local memory of different machines
can be integrated into a single logical entity by
cooperating processes on multiple sites. The shared
memory exists virtually for each process.
Trusted
Attestation Key
Distributed
Shared
Memory
Distributed
Environment
1244
[2]
[3]
VII. CONCLUSION
In this paper Attestation key for DAA scheme
called Trusted Attestation Key has been defined to
measure the usage of authorized remote users for
accessing the information stored in Distributed
Shared Memory. The Authentication can be
confirmed with the signing model. The limitation of
this work is allocating Distributed Shared Virtual
Memory and bandwidth for more number of users
which can be taken up as future work. The distributed
computing environment works with heterogeneity
feature. The DSM systems built for single user
environment need not address the heterogeneity
issues. The Trusted Computing environment has the
root of trust with the DAA protocol. The performance
feature of the distributed system has to be further
redesigned as a future work. The security mechanism
for Trusted Attestation Key has to be further
measured
with
Windows
Management
Instrumentation. The Efficiency Factor for distributed
shared memory with large scale performance has to
be configured with Distributed Component Object
Model as a future work.
[1]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
REFERENCES
Ronald Toegl, Thomas Winkler, Mohammad Nauman and
Theodore W. Hong Specification and Standardization of a
Java Trusted Computing API SOFTWARE PRACTICE
AND EXPERIENCESoftw. Pract. Exper. 2011 Published
online in Wiley Online Library (wileyonlinelibrary.com).
1245