Using Trusted Computing for enhancing Embedded Computing Platforms

ثبت نشده
چکیده

Overview: The Trusted Computing (TC) technology is today already widely applied on Personal Computer (PC) oriented platforms. Typical use scenarios are measuring system integrity for Trusted Operating Systems, secure storage for key material and certificates, identification of platforms and together with other technology like smartcards and biometrics also the authentication and identification of computer users. Parallel to the PC world there is an additional computing universe, the world of embedded computing. An embedded computing system is a special-purpose system in which the computer is completely encapsulated by the device it controls. Physically, embedded systems range from portable devices such as MP3 players, to large stationary installations like traffic lights or factory controllers. Embedded systems are designed to do some specific task, rather than be a general-purpose computer for multiple tasks. Some also have real-time performance constraints that must be met, for reason such as safety and usability; others may have low or no performance requirements, allowing the system hardware to be simplified to reduce costs. Due to the upcoming broad use and importance of these application in daily life, similar trust and security requirements are coming up, where the application of TC or at least the integration of a Trusted Platform Module (TPM) could increase system security and performance. Especially Trusted Operating Systems based on virtualization and compartment technology can not only increase trust and security but also the reliability and safety by protecting computing processes as well as application kernels against negative influence or erroneous states from other parts of the total system or from external networks. This broad use of TC will allow protecting the upcoming generation of embedded systems against the whole variation of security incidents well known from the PC world. Based on the public available standards of the Trusted Computing Group it will be shown how software modules and operating systems for all areas of trusted and secure computing in the embedded regime like mobile phones, trusted networking, and secure content management for Digital Rights Management (DRM), industrial control, automotive and a lot of similar applications will benefit from the integration of protective security and trust requirements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving trust in cloud, enterprise, and mobile computing platforms

Trust plays a fundamental role in the adoption of technology by society. Potential consumers tend to avoid a particular technology whenever they feel suspicious about its ability to cope with their security demands. Such a loss of trust could occur in important computing platforms, namely cloud, enterprise, and mobile platforms. In this thesis, we aim to improve trust in these platforms by (i) ...

متن کامل

Embedded Trusted Computing with Authenticated Non-volatile Memory

Trusted computing is an emerging technology to improve the trustworthiness of computing platforms. The Trusted Computing Group has proposed specifications for a Trusted Platform Module and a Mobile Trusted Module. One of the key problems when integrating these trusted modules into an embedded system-on-chip design, is the lack of on-chip multiple-time-programmable non-volatile memory. In this p...

متن کامل

A Direct Anonymous Attestation Scheme for Embedded Devices

Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construction that implements all anonymous authentication features specified in DAA, including authentication with total anonymity, authentication with variable anonymity, and rogue TPM tagging. Th...

متن کامل

TrustFound: Towards a Formal Foundation for Model Checking Trusted Computing Platforms

Trusted computing relies on formally verified trusted computing platforms to achieve high security assurance. In practice, however, new platforms are often proposed without a comprehensive formal evaluation and explicitly defined underlying assumptions. In this work, we propose TRUSTFOUND, a formal foundation and framework for model checking trusted computing platforms. TRUSTFOUND includes a lo...

متن کامل

Cloud Computing Technology Algorithms Capabilities in Managing and Processing Big Data in Business Organizations: MapReduce, Hadoop, Parallel Programming

The objective of this study is to verify the importance of the capabilities of cloud computing services in managing and analyzing big data in business organizations because the rapid development in the use of information technology in general and network technology in particular, has led to the trend of many organizations to make their applications available for use via electronic platforms hos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006