Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective
نویسندگان
چکیده
Public cloud providers offer ready-to-use, easily scalable servers on demand for a variety of applications. Storing and processing private sensitive data in the brings multiple security issues indeed these concerns currently prevent many users from utilizing resources. Improving both trust is increasingly important providers. In this context, we first investigate classes threats encountered by We then analyze various software- hardware-based solutions to handle challenges provide user with chain trust. Our analysis shows that pure software-based do not sufficiently mitigate environment. Hardware-based Trusted Platform Module (TPM) alleviate issues; however, it challenging implement public Finally, introduce our TPM-SGX-based approach utilizes software TPM Software Guard Extension (SGX) similar as approach.
منابع مشابه
Trusted Platform Module and Privacy: Promises and Limitations
Trusted Computing is an initiative backed by the Trusted Computing Group (TCG) which aims to provide an enhanced level of security through a combination of software and a specialized hardware device, Trusted Platform Module (TPM). TPM is a microcontroller that provides protected storage of sensitive data and a way for remote attestation to third parties. With its promoters including big name pl...
متن کاملA Software-Based Trusted Platform Module Emulator
When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix. Our emulator enables not only the implementation of flexible and low-cost test-beds and simulators but, in addition, provides programmers of tr...
متن کاملvTPM: Virtualizing the Trusted Platform Module
We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform. To this end, we virtualized the Trusted Platform Module (TPM). As a result, the TPM’s secure storage and cryptographic functions are available to operating systems and applications running in virtual machines. Our new facility supports hi...
متن کاملCloaking Malware with the Trusted Platform Module
The Trusted Platform Module (TPM) is commonly thought of as hardware that can increase platform security. However, it can also be used for malicious purposes. The TPM, along with other hardware, can implement a cloaked computation, whose memory state cannot be observed by any other software, including the operating system and hypervisor. We show that malware can use cloaked computations to hide...
متن کاملTrusted Computing: The TCG Trusted Platform Module Specification
In recent years, the necessity, functionality and new possibilities of trusted computing, especially the new standard from the Trusted Computing group (TCG) have been a hot topic of discussion in many forums. Also a lot of fears and misgivings in special for the use in PC environments have been provoked. In the meantime this technology has come of age, initial standards have been agreed upon an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IT Professional
سال: 2022
ISSN: ['1941-045X', '1520-9202']
DOI: https://doi.org/10.1109/mitp.2022.3147968