Property-Based TPM Virtualization
نویسندگان
چکیده
Today, virtualization technologies and hypervisors celebrate their rediscovery. Especially migration of virtual machines (VMs) between hardware platforms provides a useful and cost-e ective means to manage complex IT infrastructures. A challenge in this context is the virtualization of hardware security modules like the Trusted Platform Module (TPM) since the intended purpose of TPMs is to securely link software and the underlying hardware. Existing solutions for TPM virtualization, however, have various shortcomings that hinder the deployment to a wide range of useful scenarios. In this paper, we address these shortcomings by presenting a exible and privacy-preserving design of a virtual TPM that in contrast to existing solutions supports di erent approaches for measuring the platform's state and for key generation, and uses property-based attestation mechanisms to support software updates and VM migration. Our solution improves the maintainability and applicability of hypervisors supporting hardware security modules like TPM.
منابع مشابه
Design and Implementation of the TPM User Authentication Model
The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to assure end users of their privacy and confidentiality. Although the TPM is designed to prevent software attacks, the TPM itself is vulnerable to physical attacks that could enable intruders to gain access to confidential data. In general, the TPM provides an ID and implements a password identific...
متن کاملPE-TLBS: Secure Location Based Services Environment with Emphasis on Direct Anonymous Attestation Protocol
Nowadays, an IT officer would normally use virtualization as a security mechanism to provide clandestine isolation environment and concurrently hope with optimism to secure the emerging of cloud computing. Indeed, virtualization offers some kind of computing defense from being attacked from the cloud infrastructure. Significantly, the proliferation of Location Based Services in mobile and wirel...
متن کاملThe Relationship between Body Mass Index and Temperament, Based on the Knowledge of Traditional Persian Medicine
BACKGROUND Temperament is one of the key concepts in traditional Persian medicine (TPM), which is the quality that will be obtained by the reaction between the four elements of water, earth, fire and air, and its property is different from the component property. According to TPM, temperament is influenced by many factors and the bulk of the body is one of these factors. In this study, we aimed...
متن کاملAn Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group (TCG) to attest the system state of the communication partners, to guarantee that the system is free of malware and that its software has not been tampered with. To achieve meaningful attestation, virtualization is us...
متن کاملSecurity of the Enhanced TCG Privacy-CA Solution
The privacy-CA solution (PCAS) designed by the Trusted Computing Group (TCG) was specified in TCG Trusted Platform Module (TPM) Specification Version 1.2 in 2003 and allows a TPM to obtain from a certification authority (CA) certificates on short term keys. The PCAS protocol is a lighter alternative to the Direct Anonymous Attestation (DAA) scheme for anonymous platform authentication. The firs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008