cTPM: A Cloud TPM for Cross-Device Trusted Applications

نویسندگان

  • Chen Chen
  • Himanshu Raj
  • Stefan Saroiu
  • Alec Wolman
چکیده

Current Trusted Platform Modules (TPMs) are illsuited for use in mobile services because they hinder sharing data across multiple devices seamlessly, they lack access to a trusted real-time clock, and their nonvolatile storage performs poorly. This paper presents cloud TPM (cTPM), an extension of the TPM’s design to address these problems. cTPM includes two features: 1) a cloud seed shared between the TPM and the cloud; and 2) remote storage in addition to the on-chip storage. cTPM allows the cloud to create and share TPMprotected keys across multiple devices, to manage a portion of a mobile device’s TPM storage, and to provide each TPM with a trusted real-time clock and with highperformance non-volatile storage.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

TPM-Performance Sensible Key Management Protocols for Service Provisioning in Cloud Computing

A Trusted Platform Module (TPM) is a small and hence low-performance hardware chip whose main function — at least for the service provisioning topic of this paper — is to play a trusted third party’s role inside a service provisioning computing platform so that the platform will have what we call a behaviour conformity property. The property of behaviour conformity is most needed in service ori...

متن کامل

TPM as a Middleware for Enterprise Data Security

Cloud Computing is one of the emerging technologies in Computer Science. Cloud provides various types of services to us. In the Private Cloud Computing the major concern is to securing data/files and also providing privacy. Storage as a Service is generally seen as a good alternative for a small or mid-sized business that lacks the capital budget and/or technical personnel to implement and main...

متن کامل

A Secure Mobile Learning Framework based on Cloud

With the rising need for highly advanced and digital learning coupled with the growing penetration of smartphones has contributed to the growth of Mobile Learning. According to Ericsson’s forecast, 80% of the world’s population (6.4 billion people) will be Smartphone users by 2021. But the existing Mobile Learning Frameworks has some limitations that need to be addressed for mass adaptation, li...

متن کامل

Securing a Firm’s Computer Operating System: Trusted Platform Module

Recently Trusted Platform Module (TPM) is emerged as a new solution to secure computers and other systems. It is a small microchip that enables encryption and stores authentication information in computer motherboard. This paper presents the initiative of trust computing and an overview of TPM along with architecture and security features. We also discuss the applications and future of TPM. In ...

متن کامل

Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification

The Trusted Platform Module (TPM) is a device that can be used to enhance the security of web applications. However, the TPM has to be used in a proper manner in order to benefit from its security properties. A threat model will contribute towards developing a better understanding of how to use the TPM and serve as a reference for future work. In this paper, a web application scenario based on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014