Algorithm 2 Multi-layered security model using PUF: Client is an existing User [2] |
Objective:
The seven layer cloud model consisting of FPGA clouds verifies the identity of a client FPGA () who is requesting access.
The cloud model provides application access for the genuine client ().
Prerequisites:
An n-bit input, 1-bit output XOR PUF is reconfigured in all layers of the . There exists a PUF for every authenticated user. PUF represents the identity of the user i in the cloud layer j.
A combined mathematical model representing all the K PUFs in the cloud layers, resides with each user .
and user have agreed on a fixed encoding scheme and a decoding scheme , such that for any binary string and are injective, and .
and user have agreed on a shuffling scheme , and where is a random number.
Input:
S, , , , , ,
Tenant session: S
Contents of session packets:
Contents of FW:
Contents of
Contents of
Contents of
-
Contents of
Note: represents content of layer j
Output:
A value in variable S to show that the application access is granted () or denied ().
|
Steps:
-
1.
Initialize , ,
-
2.
requests , for an introduction to access application A
-
3.
to : request introduction of to cloud layers
-
4.
to : sends a random number and a set of challenges consisting of q challenge bits each of length ‘n’.
-
5.
calculates the following:
, ,
, ,
=
-
6.
to : certificate
-
7.
-
8.
if; Verified introducing client
-
(a)
foreach layer jdo
-
i
, initiates DPR and configures a new PUF , PUF represents the identity of the in the cloud layer j
-
ii
to PUF modeling parameters
-
(b)
generates a combined Mathematical model of all PUFs in the cloud layers
-
(c)
generates obfuscated bitstreams of PUF mathematical model
-
(d)
initiates remote dynamic partial reconfiguration of PUF in the dynamic partition of the
-
(e)
and exit; follow protocol-1. is same as any other existing client.
|