Virtual TPM for a secure cloud: fallacy or reality?
Please use this identifier to cite or link to this item:
|Title:||Virtual TPM for a secure cloud: fallacy or reality?|
|Authors:||Cucurull, Jordi | Guasch, Sandra|
|Keywords:||Cloud | Security | TPM | vTPM | Virtualisation | XEN | QEMU|
|Knowledge Area:||Ciencia de la Computación e Inteligencia Artificial|
|Publisher:||Universidad de Alicante|
|Citation:||Actas de la XIII Reunión Española sobre Criptología y Seguridad de la Información : celebrado del 5 al 8 de septiembre 2014, Alicante, pp. 197-202|
|Abstract:||The cloud technology has dramatically increased the virtualisation usage during the last years. Nevertheless, the virtualisation has also imposed some challenges on the security of the cloud. A remarkable case is in the usage of cryptographic hardware such as the Trusted Platform Module (TPM). A TPM is a device, physically attached to a server, that provides several cryptographic functionalities to offer a foundation of trust for the running software. Unfortunately, the virtualisation of the TPM to bring its security properties to virtual environments is not direct due to its design and security constraints. During the last years several proposals have been presented to solve the virtualisation of the TPM. Nevertheless, the virtualisation systems have not started to adopt them until very recently. This paper reviews three existing implementations of virtual TPM in the Xen and QEMU virtualisation solutions. The main contribution of the paper is an analysis of these solutions from a security perspective.|
|Sponsor:||This work has been co-funded by the project Trusted Cloud IPT-2011-1166-430000 of the Ministry of Economy and Competitiveness (MINECO) and the European Fund for Regional Development (FEDER)”.|
|Appears in Collections:||Congresos - RECSI 2014 - Comunicaciones|
Files in This Item:
Items in RUA are protected by copyright, with all rights reserved, unless otherwise indicated.