Skip to main content

A Trusted Computing Base for Information System Classified Protection

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11063))

Included in the following conference series:

  • 1657 Accesses

Abstract

The 21st century is the age of information when information becomes an important strategic resource. Information security turns into one of the biggest issues facing computer technology today. Our computer systems face the risk of being plagued by powerful, feature-rich malware. Current malware exploit the vulnerabilities that are endemic to the huge computing base that needs to be trusted to secure our private information. This summary presents the trusted computing base (TCB) and the Trusted Computing Group (TCG). TCB is the collectivity of the computer’s protector, which influences the security of system. The Trusted Computing Group (TCG) is an international industry standards group. There are extensive theories about information security and technology. Providing some technology and methods that can prevent you system from being attacked by malware and controlled by unauthorized persons. At last, we introduce efficient TCB reduction.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Balfe, S., Gallery, E., Mitchell, C.J., Paterson, K.G.: Challenges for trusted computing. IEEE Secur. Priv. 6(6), 60–66 (2008)

    Article  Google Scholar 

  2. Balfe, S., Paterson, K.G.: Augmenting internet-based card not present transactions with trusted computing: an analysis. Technical report RHUL-MA-2006-9, Department of Mathematics, Royal Holloway, University of London (2005)

    Google Scholar 

  3. Barham, P., et al.: Xen and the art of virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles (2003)

    Google Scholar 

  4. Garfinkel, T., Rosenblum, M., Boneh, D.: Flexible OS support and applications for trusted computing. In: The 9th Workshop on Hot Topics in Operating Systems, HotOS, Lihue, Hawaii, USA, pp. 145–150 (2003)

    Google Scholar 

  5. Trusted Computing Group (TCG): TPM Main Specification Version 1.2 rev. 103 (2007)

    Google Scholar 

  6. Trusted Computing Group. PC client specific TPM interface specification (TIS). Version 1.2, Revision 1.00. (2005)

    Google Scholar 

  7. Brumley, D., Song, D.: Privtrans: automatically partitioning programs for privilege separation. In: USENIX Security Symposium, San Diego, USA, pp. 57–72 (2004)

    Google Scholar 

  8. Kuhlmann, D., Landfermann, R., Ramasamy, H., Schunter, M., Ramunno, G., Vernizzi, D.: An open trusted computing architecture—secure virtual machines enabling user-defined policy enforcement (2006)

    Google Scholar 

  9. Sadeghi, A.-R., Stüble, C., Pohlmann, N.: European multilateral secure computing base| open trusted computing for you and me, White paper (2004)

    Google Scholar 

  10. McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for TCB minimization. In Proceedings of the ACM European Conference in Computer Systems (2008)

    Google Scholar 

  11. McCune, M., Parno, B., Perrig, A., Reiter, M.K., Seshadri, A.: How low can you go? Recommendations for hardware-supported minimal TCB code execution. In: ASPLOS (2008)

    Google Scholar 

  12. Engler, D., Chelf, B., Chou, A., Hallem, S.: Checking system rules using system-specific, programmer-written compiler extensions. In: Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation, vol. 4. USENIX Association (2000)

    Google Scholar 

  13. Trusted Computing Group. Trusted platform module main specification. Version 1.2, Revision 94. (2006)

    Google Scholar 

  14. Singaravelu, L., Pu, C., Haertig, H., Helmuth, C.: Reducing TCB complexity for security-sensitive applications: three case studies. In: Proceedings of the ACM European Conference in Computer Systems (EuroSys) (2006)

    Google Scholar 

  15. Camenisch, J.: Better privacy for trusted computing platforms. In: Proceedings of the European Symposium on Research in Computer Security (ESORICS) (2004)

    Chapter  Google Scholar 

  16. Anderson, D.P., Cobb, J., Korpela, E., Lebofsky, M., Werthimer, D.: SETI@ home: an experiment in public-resource computing. Commun. ACM 45(11), 56–61 (2002)

    Article  Google Scholar 

  17. Clarke, D., et al.: The untrusted computer problem and camera-based authentication. In: Mattern, F., Naghshineh, M. (eds.) Pervasive 2002. LNCS, vol. 2414, pp. 114–124. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45866-2_10

    Chapter  Google Scholar 

  18. Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: ACM SIGOPS Operating Systems Review, vol. 37, pp. 193–206. ACM (2003)

    Article  Google Scholar 

  19. Brumley, D., Song, D.: Privtrans: automatically partitioning programs for privilege separation. In: Proceedings of USENIX Security Symposium (2004)

    Google Scholar 

  20. Garnkel, T., Pfa, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: a virtual machine-based platform for trusted computing. In: Proceedings of the Symposium on Operating System Principles (2003)

    Google Scholar 

  21. Kauer, B.: OSLO: improving the security of trusted computing. In: Proceedings of the USENIX Security Symposium (2007)

    Google Scholar 

  22. Trusted Computing Group. Trusted platform module main specification, Part 1: Design principles, Part 2: TPM structures, Part 3: Commands. Version 1.2, Revision 103 (2007)

    Google Scholar 

  23. Sadeghi, A.R., Selhorst, M., Stüble, C., Wachsmann, C., Winandy, M.: TCG inside?: A note on TPM specification compliance. In: Proceedings of the First ACM Workshop on Scalable Trusted Computing, pp. 47–56. ACM (2006)

    Google Scholar 

  24. Datta, A., Franklin, J., Garg, D., Kaynar, D.: A logic of secure systems and its application to trusted computing. In: 2009 30th IEEE Symposium on Security and Privacy, pp. 221–236. IEEE (2009)

    Google Scholar 

Download references

Acknowledgment

This paper is supported by the National Natural Science Foundation of China under Grant No. 61572153 and the National Key research and Development Plan (Grant No. 2018YFB0803504).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Lu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lu, H., Cui, X., Wang, L., Jiang, Y., Jia, R. (2018). A Trusted Computing Base for Information System Classified Protection. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11063. Springer, Cham. https://doi.org/10.1007/978-3-030-00006-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00006-6_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00005-9

  • Online ISBN: 978-3-030-00006-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics