Virtual TPM for a secure cloud: fallacy or reality?

Please use this identifier to cite or link to this item: http://hdl.handle.net/10045/40428
Full metadata record
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCucurull, Jordi-
dc.contributor.authorGuasch, Sandra-
dc.date.accessioned2014-09-18T12:06:15Z-
dc.date.available2014-09-18T12:06:15Z-
dc.date.issued2014-09-
dc.identifier.citationActas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante, pp. 197-202es
dc.identifier.isbn978-84-9717-323-0-
dc.identifier.urihttp://hdl.handle.net/10045/40428-
dc.description.abstractThe cloud technology has dramatically increased the virtualisation usage during the last years. Nevertheless, the virtualisation has also imposed some challenges on the security of the cloud. A remarkable case is in the usage of cryptographic hardware such as the Trusted Platform Module (TPM). A TPM is a device, physically attached to a server, that provides several cryptographic functionalities to offer a foundation of trust for the running software. Unfortunately, the virtualisation of the TPM to bring its security properties to virtual environments is not direct due to its design and security constraints. During the last years several proposals have been presented to solve the virtualisation of the TPM. Nevertheless, the virtualisation systems have not started to adopt them until very recently. This paper reviews three existing implementations of virtual TPM in the Xen and QEMU virtualisation solutions. The main contribution of the paper is an analysis of these solutions from a security perspective.es
dc.description.sponsorshipThis work has been co-funded by the project Trusted Cloud IPT-2011-1166-430000 of the Ministry of Economy and Competitiveness (MINECO) and the European Fund for Regional Development (FEDER)”.es
dc.languageenges
dc.publisherUniversidad de Alicantees
dc.subjectCloudes
dc.subjectSecurityes
dc.subjectTPMes
dc.subjectvTPMes
dc.subjectVirtualisationes
dc.subjectXENes
dc.subjectQEMUes
dc.subject.otherCiencia de la Computación e Inteligencia Artificiales
dc.titleVirtual TPM for a secure cloud: fallacy or reality?es
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dc.peerreviewedsies
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.relation.projectIDinfo:eu-repo/grantAgreement/MICINN//IPT-2011-1166-430000-
Appears in Collections:RECSI 2014 - Comunicaciones

Files in This Item:
Files in This Item:
File Description SizeFormat 
ThumbnailRECSI-2014_36.pdf190,9 kBAdobe PDFOpen Preview


Items in RUA are protected by copyright, with all rights reserved, unless otherwise indicated.