Trusted Platform Module-Based Privacy in the Public Cloud: Challenges and Future Perspective

نویسندگان

چکیده

Public cloud providers offer ready-to-use, easily scalable servers on demand for a variety of applications. Storing and processing private sensitive data in the brings multiple security issues indeed these concerns currently prevent many users from utilizing resources. Improving both trust is increasingly important providers. In this context, we first investigate classes threats encountered by We then analyze various software- hardware-based solutions to handle challenges provide user with chain trust. Our analysis shows that pure software-based do not sufficiently mitigate environment. Hardware-based Trusted Platform Module (TPM) alleviate issues; however, it challenging implement public Finally, introduce our TPM-SGX-based approach utilizes software TPM Software Guard Extension (SGX) similar as approach.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trusted Platform Module and Privacy: Promises and Limitations

Trusted Computing is an initiative backed by the Trusted Computing Group (TCG) which aims to provide an enhanced level of security through a combination of software and a specialized hardware device, Trusted Platform Module (TPM). TPM is a microcontroller that provides protected storage of sensitive data and a way for remote attestation to third parties. With its promoters including big name pl...

متن کامل

A Software-Based Trusted Platform Module Emulator

When developing and researching new trusted computing technologies, appropriate tools to investigate their behavior and to evaluate their performance are of paramount importance. In this paper, we present an efficient and portable TPM emulator for Unix. Our emulator enables not only the implementation of flexible and low-cost test-beds and simulators but, in addition, provides programmers of tr...

متن کامل

vTPM: Virtualizing the Trusted Platform Module

We present the design and implementation of a system that enables trusted computing for an unlimited number of virtual machines on a single hardware platform. To this end, we virtualized the Trusted Platform Module (TPM). As a result, the TPM’s secure storage and cryptographic functions are available to operating systems and applications running in virtual machines. Our new facility supports hi...

متن کامل

Cloaking Malware with the Trusted Platform Module

The Trusted Platform Module (TPM) is commonly thought of as hardware that can increase platform security. However, it can also be used for malicious purposes. The TPM, along with other hardware, can implement a cloaked computation, whose memory state cannot be observed by any other software, including the operating system and hypervisor. We show that malware can use cloaked computations to hide...

متن کامل

Trusted Computing: The TCG Trusted Platform Module Specification

In recent years, the necessity, functionality and new possibilities of trusted computing, especially the new standard from the Trusted Computing group (TCG) have been a hot topic of discussion in many forums. Also a lot of fears and misgivings in special for the use in PC environments have been provoked. In the meantime this technology has come of age, initial standards have been agreed upon an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IT Professional

سال: 2022

ISSN: ['1941-045X', '1520-9202']

DOI: https://doi.org/10.1109/mitp.2022.3147968