Abstract
In this rapidly changing IT society, computer system security is very crucial. This system security applies not only to individuals’ computer systems but also to cloud environments. “Cloud” concerns operations on the web; therefore it is exposed to a lot of risks and security of its spaces where data are stored is vulnerable. Accordingly, in order to reduce factors of threat to security, the TCG (Trusted Computing Group) proposed a highly reliable platform based on a semiconductor-chip, TPM(Trusted Platform Module). Therefore, this paper proposes a m-TMS (Mobile Trusted Monitoring System) that monitors trusted state of a computing environment on which TPM chip-based TPB (Trusted Platform Board) is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. m-TMS is provided to users so that system resources of CPU, RAM, and process, the objects of monitoring in a computer system, may be monitored. Moreover, converting and detouring of single entities like PC or target addresses, which are attack pattern methods that pose a threat to computer system security, are combined. Branch instruction trace function is monitored using a BiT (Branch Instruction Trace) Profiling tool through which processes attacked or those suspected of being attacked may be traced, enabling users to actively respond.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Trusted Computing Group Web Site, http://www.trustedcomputinggroup.org
TCG Specification Architecture Overview Specification Revision 1.4, Trusted Computing Group (TCG) (2007)
Common Criteria, Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB) Protection Profile and TCG PC Specific TBB With Maintenance Protection Profile (2004)
Lin, H., Lee, G.: Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace. Journal of Information Security 1(1), 1–10 (2010)
IBM, Integrity Measurement Architecture (IMA), http://domino.research.ibm.com/comm/researchpeople.nsf/pages/sailer.ima.html
Jeong, Y.-S., Park, J.H.: Visual Trustworthy Monitoring System (v-TMS) for Behavior of Trusted Computing. Journal of Internet Technology 11(6), 731–741 (2010)
Suh, G., O’Donnell, C., Sachdev, I., Devadas, S.: Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions. Technical Report, MIT CSAIL CSG Technical Memo 483 (2004)
Alves, T., Felton, D.: Trustzone: Integrated Hardware and Software Security. ARM white paper (2004)
Halfhill, T.: ARM Dons Armor: TrustZone Security Extensions Strengthen ARMv6 Architecture. Microprocessor Report (2003)
Crandall, J., Chong, F.: Minos: Control Data Attack Prevention Orthogonal To Memory Model. In: Proc. the 37th Int’l. Symp. on Micro Architecture (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, HW., Song, EH., Kim, JH., Park, S.O., Jeong, YS. (2012). Development of m-TMS for Trusted Computing in Mobile Cloud. In: Li, R., Cao, J., Bourgeois, J. (eds) Advances in Grid and Pervasive Computing. GPC 2012. Lecture Notes in Computer Science, vol 7296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30767-6_31
Download citation
DOI: https://doi.org/10.1007/978-3-642-30767-6_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30766-9
Online ISBN: 978-3-642-30767-6
eBook Packages: Computer ScienceComputer Science (R0)