Virtual TPM for a secure cloud: fallacy or reality?

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10045/40428
Información del item - Informació de l'item - Item information
Título: Virtual TPM for a secure cloud: fallacy or reality?
Autor/es: Cucurull, Jordi | Guasch, Sandra
Palabras clave: Cloud | Security | TPM | vTPM | Virtualisation | XEN | QEMU
Área/s de conocimiento: Ciencia de la Computación e Inteligencia Artificial
Fecha de publicación: sep-2014
Editor: Universidad de Alicante
Cita bibliográfica: Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante, pp. 197-202
Resumen: The cloud technology has dramatically increased the virtualisation usage during the last years. Nevertheless, the virtualisation has also imposed some challenges on the security of the cloud. A remarkable case is in the usage of cryptographic hardware such as the Trusted Platform Module (TPM). A TPM is a device, physically attached to a server, that provides several cryptographic functionalities to offer a foundation of trust for the running software. Unfortunately, the virtualisation of the TPM to bring its security properties to virtual environments is not direct due to its design and security constraints. During the last years several proposals have been presented to solve the virtualisation of the TPM. Nevertheless, the virtualisation systems have not started to adopt them until very recently. This paper reviews three existing implementations of virtual TPM in the Xen and QEMU virtualisation solutions. The main contribution of the paper is an analysis of these solutions from a security perspective.
Patrocinador/es: This work has been co-funded by the project Trusted Cloud IPT-2011-1166-430000 of the Ministry of Economy and Competitiveness (MINECO) and the European Fund for Regional Development (FEDER)”.
URI: http://hdl.handle.net/10045/40428
ISBN: 978-84-9717-323-0
Idioma: eng
Tipo: info:eu-repo/semantics/conferenceObject
Revisión científica: si
Aparece en las colecciones:Congresos - RECSI 2014 - Comunicaciones

Archivos en este ítem:
Archivos en este ítem:
Archivo Descripción TamañoFormato 
ThumbnailRECSI-2014_36.pdf190,9 kBAdobe PDFAbrir Vista previa


Todos los documentos en RUA están protegidos por derechos de autor. Algunos derechos reservados.