Skip to main content
Erschienen in:
Buchtitelbild

2012 | OriginalPaper | Buchkapitel

Utilizing TPM Functionalities on Remote Server

verfasst von : Norazah Abd Aziz, Putri Shahnim Khalid

Erschienen in: Computer Science and its Applications

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trusted Platform Module (TPM) has become an essential functionality in the information security world today. However, there are legacy computers that do not have TPM onboard and would still want to use the TPM functionalities without having to replace the hardware. Also, TPMs are not available for virtual machines hence there is a need to provide integrity of the virtual machine platforms. This paper introduces a framework to provide a remote server with TPM capabilities for the legacy computer and also virtual machines to be able to utilize TPM functionalities. In this framework, there is also a need to provide fault tolerance mechanism to ensure reliability of the server and also scalability feature is incorporated to cater for growing number of users. The main component of the framework is the ‘vTPM Manager’ module which resides in the remote TPM server. This vTPM Manager handles the creation and deletion of virtual TPMs, providing fault tolerance mechanism and also scalability feature for the whole system. By using this framework, users who do not have a TPM residing in their device would be able to remotely access the TPM server to utilize the TPM functionalities with the assurance of a fault tolerance mechanism and the number of users is unlimited since it is scalable.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat TPM Main: Part 1 design principles. 1.2 revision 85 edition, (2005) TPM Main: Part 1 design principles. 1.2 revision 85 edition, (2005)
3.
Zurück zum Zitat Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., Doorn, L.v.: vTPM: virtualizing the trusted platform module. In: 15th USENIX security symposium (2006) Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., Doorn, L.v.: vTPM: virtualizing the trusted platform module. In: 15th USENIX security symposium (2006)
4.
Zurück zum Zitat Stumpf, F., Benz, M., Hermanowski. M., and Eckert, C.: Approach to a trustworthy system architecture using virtualization. ATC 2007, LNCS 4610, pp. 191–202, Springer (2007) Stumpf, F., Benz, M., Hermanowski. M., and Eckert, C.: Approach to a trustworthy system architecture using virtualization. ATC 2007, LNCS 4610, pp. 191–202, Springer (2007)
5.
Zurück zum Zitat Wang, W., Zhang, Y., Lin, B., Wu, X.Y., Miao, K.: Secured and reliable VM migration in personal cloud, 2nd international conference on computer engineering and technology (ICCET), IEEE (2010) Wang, W., Zhang, Y., Lin, B., Wu, X.Y., Miao, K.: Secured and reliable VM migration in personal cloud, 2nd international conference on computer engineering and technology (ICCET), IEEE (2010)
6.
Zurück zum Zitat Dai, W., Jin, H., Zou, D., Xu, S., Zhen, W. and Shi, L.; TEE: A virtual DRTM based execution environment for secure cloud-end computing. Proceeding CCS’10 proceedings of the 17th conference on computer and communications security, ISBN: 978-1-4503-0244-9, ACM (2010) Dai, W., Jin, H., Zou, D., Xu, S., Zhen, W. and Shi, L.; TEE: A virtual DRTM based execution environment for secure cloud-end computing. Proceeding CCS’10 proceedings of the 17th conference on computer and communications security, ISBN: 978-1-4503-0244-9, ACM (2010)
7.
Zurück zum Zitat Shilin, Z., Mei, G.: Distributed multimedia content processing based on web service. Proceeding of international forum on computer science-technology and applications, ISBN: 978-0-7695-3930-0, IEEE (2009) Shilin, Z., Mei, G.: Distributed multimedia content processing based on web service. Proceeding of international forum on computer science-technology and applications, ISBN: 978-0-7695-3930-0, IEEE (2009)
8.
Zurück zum Zitat Morel, G., Pétin, J.F., Johnson, T.L.: Reliability, maintainability, and safety. Springer handbook of automation (2009) Morel, G., Pétin, J.F., Johnson, T.L.: Reliability, maintainability, and safety. Springer handbook of automation (2009)
9.
Zurück zum Zitat Clarke, J., Dede, C.: Robust designs for scalability. AECT research symposium, June 22–25, Bloomington, Indiana (2006) Clarke, J., Dede, C.: Robust designs for scalability. AECT research symposium, June 22–25, Bloomington, Indiana (2006)
10.
Zurück zum Zitat Norazah, A.A., Lucyantie, M.: Identity credential issuance with trusted computing, 2nd international conference on computing and informatics, ICOCI’09 (2009) Norazah, A.A., Lucyantie, M.: Identity credential issuance with trusted computing, 2nd international conference on computing and informatics, ICOCI’09 (2009)
11.
Zurück zum Zitat Lucyantie, M., Norazah, A.A., Habibah, H., Mohd Anuar, M.I.: Attestation with trusted configuration machine. Proceeding of international conference on computer applications and industrial electronics ICCAIE, ISBN: 9781457720574, IEEE (2011) Lucyantie, M., Norazah, A.A., Habibah, H., Mohd Anuar, M.I.: Attestation with trusted configuration machine. Proceeding of international conference on computer applications and industrial electronics ICCAIE, ISBN: 9781457720574, IEEE (2011)
Metadaten
Titel
Utilizing TPM Functionalities on Remote Server
verfasst von
Norazah Abd Aziz
Putri Shahnim Khalid
Copyright-Jahr
2012
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-007-5699-1_1