Securing Shared Untrusted Storage by using TPM 1.2 Without Requiring a Trusted OS

نویسندگان

  • Marten van Dijk
  • Luis F. G. Sarmenta
  • Jonathan Rhodes
  • Srinivas Devadas
چکیده

We address the problem of using an untrusted server with a trusted platform module (TPM) to provide trusted storage for a large number of clients, where each client may own and use several different devices that may be offline at different times and may not be able to communicate with each other except through the untrusted server (over an untrusted network). The clients only trust the server’s TPM; the server’s BIOS, CPU, and OS are not assumed to be trusted. We show how the currently available TPM 1.2 technology can be used to implement tamper-evident storage, where clients are guaranteed to at least detect illegitimate modifications to their data (including replay attacks) whenever they wish to perform a critical operation that relies on the freshness and validity of the data. In particular, we introduce and analyze a log-based scheme in which the built-in monotonic counter of a TPM 1.2 chip is used to securely implement a large number of virtual monotonic counters, which can then be used to time-stamp data and provide tamper-evident storage. Tamper-tolerant storage, which guarantees that a client can continue to retrieve its original data even after a malicious attack, is provided by using data replication on top of the tamper-evident storage system. As a separate application of our log-based scheme, we also show how these virtual monotonic counters can be used to implement one-time certificates, which are certificates that can be spent at most once. One-time certificates can be used for one-time authentication and authorization, and can be useful in applications such as DRM, offline payments, and others. Finally, we implement these ideas using an actual PC with a TPM 1.2 chip and present preliminary performance results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtual Monotonic Counters and Count-Limited Objects using a TPM without a Trusted OS (Extended Version)

A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay attacks, including offline payment, e-wallets, virtual trusted storage, and digital rights management (DRM). In this paper, we show how one can implement a very large number of virtual monotonic counters on an untrusted...

متن کامل

cTPM: A Cloud TPM for Cross-Device Trusted Applications

Current Trusted Platform Modules (TPMs) are illsuited for use in mobile services because they hinder sharing data across multiple devices seamlessly, they lack access to a trusted real-time clock, and their nonvolatile storage performs poorly. This paper presents cloud TPM (cTPM), an extension of the TPM’s design to address these problems. cTPM includes two features: 1) a cloud seed shared betw...

متن کامل

TPM as a Middleware for Enterprise Data Security

Cloud Computing is one of the emerging technologies in Computer Science. Cloud provides various types of services to us. In the Private Cloud Computing the major concern is to securing data/files and also providing privacy. Storage as a Service is generally seen as a good alternative for a small or mid-sized business that lacks the capital budget and/or technical personnel to implement and main...

متن کامل

Attack, Solution and Verification for Shared Authorisation Data in TCG TPM

The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve greater security. Proof of possession of authorisation values known as authdata is required by user processes in order to use TPM keys. If a group of users are to be authorised to use a key, then the authdata for the key may be shared among them. We show that sharing authdata between users allows a TPM ...

متن کامل

Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines

Trusted computing platforms aim to provide trust in computations performed by sensitive applications. Verifying the integrity of memory contents is a crucial security service that these platforms must provide since an adversary able to corrupt the memory space can affect the computations performed by the platform. After a description of the active attacks that threaten memory integrity, this pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007