skip to main content
10.1145/3134302.3134320acmotherconferencesArticle/Chapter ViewAbstractPublication PagescompsystechConference Proceedingsconference-collections
research-article

Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol

Authors Info & Claims
Published:23 June 2017Publication History

ABSTRACT

As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this work, we aim to discuss the Trusted Computing approaches applied on Cloud Computing security and focusing on their drawbacks on hardware verification (i.e., to attest hardware's integrity). We propose a model for hardware integrity attestation applied on Cloud Computing systems, presenting the main protocol based on the use of Endorsement Keys (EK) known from Trusted Computing. The validity of our protocol and its potentials against hardware-based attacks is proved by the combined use of verified Public-Key encryption algorithms.

References

  1. Asokan, N., Ekberg, J. E., Kostiainen, K., Rajan, A., Rozas, C., Sadeghi, A. R., Schulz, S. and Wachsmann, C.: Mobile trusted computing. Proceedings of the IEEE, 102(8), pp. 1189--1206 (2014).Google ScholarGoogle ScholarCross RefCross Ref
  2. Chen, Y., Paxson, V. and Katz, R. H.: What's new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 (2010).Google ScholarGoogle Scholar
  3. England, P. and Tariq, T: Towards a programmable TPM. In: International Conference on Trusted Computing, pp. 1--13 (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Krautheim, F. J., Phatak, D. S., and Sherman, A. T.: Introducing the trusted virtual environment module: a new mechanism for rooting trust in cloud computing. In International Conference on Trust and Trustworthy Computing, pp. 211--227 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Li, X. Y., Zhou, L. T., Shi, Y., and Guo, Y.: A trusted computing environment model in cloud architecture. In International Conference on Machine Learning and Cybernetics (ICMLC), pp. 2843--2848(2010).Google ScholarGoogle ScholarCross RefCross Ref
  6. Maene, P., Götzfried, J., de Clercq, R., Müller, T., Freiling, F., and Verbauwhede, I.: Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Transactions on Computers (2017).Google ScholarGoogle Scholar
  7. Madhavi, K. V., Tamilkodi, R., and Jaya Sudha, K.: Cloud Computing: Security threats and Counter Measures. In International Journal of Research in Computer and Communication Technology (IJRCCT), pp. 125--128 (2012).Google ScholarGoogle Scholar
  8. Parno, B., McCune, J. M. and Perrig, A.: Bootstrapping trust in commodity computers. In Security and privacy (SP), pp. 414--429 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Reddy, V. K., Rao, B. T., and Reddy, L. S. S.: Research issues in cloud computing. Global Journal of Computer Science and Technology, 11(11) (2011).Google ScholarGoogle Scholar
  10. Santos, N., Gummadi, K. P. and Rodrigues, R.: Towards Trusted Cloud Computing. HotCloud, 9(9), 3 (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sanjay Ram, M., and Vijayaraj, V.: Analysis of the characteristics and trusted security of cloud computing. International Journal on Cloud Computing, 1, 61--69 (2011).Google ScholarGoogle Scholar
  12. Shen, Z., Li, L., Yan, F., and Wu, X.: Cloud computing system based on trusted computing platform. In International Conference on Intelligent Computation Technology and Automation (ICI-CTA), pp. 942--945 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Shen, Z., and Tong. 'Q.: The security of cloud computing system enabled by trusted computing technology. In 2nd International Conference on Signal Processing Systems (ICSPS), pp. 11--15 (2010).Google ScholarGoogle ScholarCross RefCross Ref
  14. Youssef, A. E. and Alageel, M.: A framework for secure cloud computing, IJCSI International Journal of Computer Science Issues, 9(4), 487--500 (2012).Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    CompSysTech '17: Proceedings of the 18th International Conference on Computer Systems and Technologies
    June 2017
    358 pages
    ISBN:9781450352345
    DOI:10.1145/3134302

    Copyright © 2017 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 23 June 2017

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    CompSysTech '17 Paper Acceptance Rate42of107submissions,39%Overall Acceptance Rate241of492submissions,49%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader