Skip to main content

Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems

  • Conference paper
Trust and Trustworthy Computing (Trust 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6740))

Included in the following conference series:

Abstract

Embedded systems are gradually evolving into alternatives to desktop and server systems in terms of performance, energy- and cost efficiency. Moreover, with the improvement of their performance and storage capabilities, they are about to enter the domain of desktop systems and cloud computing. However, the question remains whether such systems can be used in cloud computing scenarios in a secure and energy efficient way or not and, if this is not the case, how do they have to be enhanced and which components are missing. In this paper, we present an approach to how cloud computing can be realized securely on embedded systems by means of embedded Trusted Computing. We provide a reference design of a micro-data-center and present an analysis covering the topics of performance, security as well as energy consumption. Moreover, we discuss our concept for a light-weight virtualization framework which is specifically tailored to the requirements of embedded systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ARM Ltd.: Cortex-A15 Processor, http://www.arm.com/products/processors/cortex-a/cortex-a15.php5

  2. Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)

    Article  Google Scholar 

  3. Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009, p. 3. USENIX Association, Berkeley (2009)

    Google Scholar 

  4. Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pp. 29–42. USENIX Association, Berkeley (2001)

    Google Scholar 

  5. Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium. SSYM 2004, vol. 13, p. 16. USENIX Association, Berkeley (2004)

    Google Scholar 

  6. Watson, R.N.M.: Exploiting concurrency vulnerabilities in system call wrappers. In: Proceedings of the First USENIX Workshop on Offensive Technologies, pp. 1–2. USENIX Association, Berkeley (2007)

    Google Scholar 

  7. Garfinkel, T.: Traps and Pitfalls: Practical Problems in in System Call Interposition based Security Tools. In: Proc. Network and Distributed Systems Security Symposium (February 2003)

    Google Scholar 

  8. Langley, A.: seccomp: Add bitmask of allowed system calls. Posted on linux kernel mailinglist (May 2009), http://lwn.net/Articles/332438/

  9. Corbet, J.: Tracing: no shortage of options (July 2008), http://lwn.net/Articles/291091/

  10. Noe, D.: sys socketcall: Network systems calls on Linux (April 2008), http://isoamerica.net/~dpn/socketcall1.pdf

  11. Trusted Computing Group - Mobile Phone Working Group: TCG Mobile Reference Architecture, Specification version 1.0 Revision 1 (June 12, 2007)

    Google Scholar 

  12. Alves, T., Felton, D.: TrustZone: Integrated Hardware and Software Security - Enabling Trusted Computing in Embedded Systems (July 2004), http://www.arm.com/pdfs/TZ_Whitepaper.pdf

  13. Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  14. Dietrich, K., Winter, J.: Secure boot revisited. In: The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp. 2360–2365 (November 2008)

    Google Scholar 

  15. Jan-Erik Ekberg, M.K.: Mobile Trusted Module (MTM) - an introduction (Noverber 14, 2007), http://research.nokia.com/files/NRCTR2007015.pdf

  16. FreeScale: MCIMX51 Multimedia Applications Processor Reference Manual, http://cache.freescale.com/files/dsp/doc/ref_manual/MCIMX51RM.pdf?fsrch=1&sr=5

  17. Trusted Computing Group - TPM Working Group: TPM Main Part 3 Commands, Specification version 1.2 Level 2 Revision 103 (July 9, 2007)

    Google Scholar 

  18. Winter, J.: Trusted computing building blocks for embedded linux-based arm trustzone platforms. In: STC 2008: Proceedings of the 3rd ACM workshop on Scalable Trusted Computing, pp. 21–30. ACM, New York (2008)

    Google Scholar 

  19. Dietrich, K., Winter, J.: Towards customizable, application specific mobile trusted modules. In: Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010, pp. 31–40. ACM, New York (2010)

    Chapter  Google Scholar 

  20. Trusted Computing Group, https://members.trustedcomputinggroup.org

  21. Dietrich, K.: Anonymous client authentication for transport layer security. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 268–280. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  22. Reiter, A., Neubauer, G., Kapferberger, M., Winter, J., Dietrich, K.: Seamless integration of trusted computing into standard cryptographic frameworks. In: The Second International Conference on Trusted Systems, INTRUST 2010, pp. 21–30. Springer, New York (2011)

    Google Scholar 

  23. Gumstix inc.: Gumstix product specification, http://gumstix.com/ )

  24. Gumstix inc.: robostix-TH product description, http://www.gumstix.com/store/catalog/product_info.php?products_id=142

  25. Trusted-Computing-Group-TSS-Working-Group: TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification available online at (2006), https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf Part1: Commands and Structures

  26. ARM Ltd.: RealView Versatile Express product specification

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dietrich, K., Winter, J. (2011). Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, AR., Sasse, A., Beres, Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21599-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21599-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21598-8

  • Online ISBN: 978-3-642-21599-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics