Virtual TPM for a secure cloud: fallacy or reality?

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10045/40428
Registro completo de metadatos
Registro completo de metadatos
Campo DCValorIdioma
dc.contributor.authorCucurull, Jordi-
dc.contributor.authorGuasch, Sandra-
dc.date.accessioned2014-09-18T12:06:15Z-
dc.date.available2014-09-18T12:06:15Z-
dc.date.issued2014-09-
dc.identifier.citationActas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante, pp. 197-202es
dc.identifier.isbn978-84-9717-323-0-
dc.identifier.urihttp://hdl.handle.net/10045/40428-
dc.description.abstractThe cloud technology has dramatically increased the virtualisation usage during the last years. Nevertheless, the virtualisation has also imposed some challenges on the security of the cloud. A remarkable case is in the usage of cryptographic hardware such as the Trusted Platform Module (TPM). A TPM is a device, physically attached to a server, that provides several cryptographic functionalities to offer a foundation of trust for the running software. Unfortunately, the virtualisation of the TPM to bring its security properties to virtual environments is not direct due to its design and security constraints. During the last years several proposals have been presented to solve the virtualisation of the TPM. Nevertheless, the virtualisation systems have not started to adopt them until very recently. This paper reviews three existing implementations of virtual TPM in the Xen and QEMU virtualisation solutions. The main contribution of the paper is an analysis of these solutions from a security perspective.es
dc.description.sponsorshipThis work has been co-funded by the project Trusted Cloud IPT-2011-1166-430000 of the Ministry of Economy and Competitiveness (MINECO) and the European Fund for Regional Development (FEDER)”.es
dc.languageenges
dc.publisherUniversidad de Alicantees
dc.subjectCloudes
dc.subjectSecurityes
dc.subjectTPMes
dc.subjectvTPMes
dc.subjectVirtualisationes
dc.subjectXENes
dc.subjectQEMUes
dc.subject.otherCiencia de la Computación e Inteligencia Artificiales
dc.titleVirtual TPM for a secure cloud: fallacy or reality?es
dc.typeinfo:eu-repo/semantics/conferenceObjectes
dc.peerreviewedsies
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.relation.projectIDinfo:eu-repo/grantAgreement/MICINN//IPT-2011-1166-430000-
Aparece en las colecciones:RECSI 2014 - Comunicaciones

Archivos en este ítem:
Archivos en este ítem:
Archivo Descripción TamañoFormato 
ThumbnailRECSI-2014_36.pdf190,9 kBAdobe PDFAbrir Vista previa


Todos los documentos en RUA están protegidos por derechos de autor. Algunos derechos reservados.