{"title":"A Security Scheme for Industrial Internet Platform Based on Trusted Computing Technology","authors":"Peiru Fan, Wei Zhang, Hao Zhou, Yaobing Li, Hao Jiang","doi":"10.1109/ICCEAI52939.2021.00006","DOIUrl":null,"url":null,"abstract":"With the rapid spread of network security threats, traditional “blocking and killing” protection methods cannot defend the increasingly complex, organized and specialized attacks against Industrial Internet platform (IIP). IIP is the core of industrial Internet. Once compromised, it may threaten industrial production safety, social security, and even national security. Trusted computing is a key technology of constructing active defense system with the advantages of security chip autonomy, active immunity and adaptivity. An lIP security scheme based on trusted computing technology is proposed in this paper. The scheme includes trusted enhancement of virtualization software, trusted extension of virtualization environment, trusted protection of application and trusted access of edge device. By preventing the codes and data in IIP virtualization, edge and application layers from being leaked, damaged and tampered, the overall security of IIP is improved.","PeriodicalId":331409,"journal":{"name":"2021 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computer Engineering and Artificial Intelligence (ICCEAI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCEAI52939.2021.00006","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the rapid spread of network security threats, traditional “blocking and killing” protection methods cannot defend the increasingly complex, organized and specialized attacks against Industrial Internet platform (IIP). IIP is the core of industrial Internet. Once compromised, it may threaten industrial production safety, social security, and even national security. Trusted computing is a key technology of constructing active defense system with the advantages of security chip autonomy, active immunity and adaptivity. An lIP security scheme based on trusted computing technology is proposed in this paper. The scheme includes trusted enhancement of virtualization software, trusted extension of virtualization environment, trusted protection of application and trusted access of edge device. By preventing the codes and data in IIP virtualization, edge and application layers from being leaked, damaged and tampered, the overall security of IIP is improved.