TPM as a Middleware for Enterprise Data Security
نویسندگان
چکیده
Cloud Computing is one of the emerging technologies in Computer Science. Cloud provides various types of services to us. In the Private Cloud Computing the major concern is to securing data/files and also providing privacy. Storage as a Service is generally seen as a good alternative for a small or mid-sized business that lacks the capital budget and/or technical personnel to implement and maintain their own storage. Currently, the service providers that provides cloud storage, like Dropbox provides security by server-side data encryption. Since all the encryption keys are managed by software, so such method is not secure enough. But the main issue is to maintain CIA (Confidentiality, Integrity and Authentication) to the data stored in the cloud. To achieve these we use Public Key Cryptography. For securing data we use Asymmetric key Encryption Technique. Key rings are provided by the TPM. We describe an architecture which protects enterprise data in cloud and also having authentication based on the signature. We use asymmetric keys for encrypting data. We will use the keys generated by Trusted Platform Module (TPM) for providing better security. Use of TPM is a more secure way to encrypt and decrypt data. So we have implemented a TPM as a middleware which applies the specification of Trusted Computing Group (TCG). TCG is a global industry standard, supportive of a hardware-based root of trust, for interoperable trusted computing platforms. We use TPM to encrypt data before storing it to the cloud. And we use have to use any basic Authentication Service to avoid masquerading, replay attack and eavesdropping to the client side. Key Terms: Security; TPM; TCG; Network; Cloud Storage Full Text: http://www.ijcsmc.com/docs/papers/July2013/V2I7201385.pdf
منابع مشابه
Access control in ultra-large-scale systems using a data-centric middleware
The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...
متن کاملSecurity Services in Mainstream Enterprise-Oriented Middleware Platforms
Security is an essential requirement of web-based enterprise applications. This report overviews the state of the art in security services of today’s commercial middleware platforms typically used to build this family of applications. The overview includes security services of large scale server-side middleware platforms, including web services, as well as their small footprint counterparts for...
متن کاملCertification of Distributed Component Computing Middleware and Applications
We focus on the issues related to the certification of components and applications conforming to the CORBA 3 standard. CORBA 3 is a standard for Distributed Component Computing (DCC) middleware. Similar standards include Enterprise Java Beans. The specifications for these technologies offer a set of services, such as security, transaction and persistence. Certification of DCC middleware and app...
متن کاملConcepts and Capabilities of Middleware Security
Distributed computing applications for the twenty-first century, constructed from legacy, commercial-off-the-shelf (COTS), database, and new client/server applications, require stakeholders (i.e., software architects, system designers, security officers, etc.) to architect and prototype solutions that facilitate the interoperation of new and existing applications in a network-centric environmen...
متن کاملSecurity middleware for enhancing interoperability of Public Key Infrastructure
This paper describes a security middleware for enhancing the interoperability of public key infrastructure (PKI). Security is a key concern in e-commerce and is especially critical in cross-enterprise transactions. Public key cryptography is widely accepted as an important mechanism for addressing the security needs of e-commerce transactions because of its ability to implement nonrepudiation. ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013