The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software attacks are commonly performed against embedded systems in order to access private data or to run restricted services. In this work, we demonstrate some vulnerabilities of commonly use processor which can be leveraged by hackers to attack a system. The targeted devices are based on open processor architectures OpenRISC and RISC-V. Several software exploits are discussed and demonstrated while...
With the wide application of embedded technology and its products, much attention has been turned to the development of program to improve the safety and reliability of embedded devices. In this paper, we present a construct program of embedded trusted computing environment based on QEMU virtual machine architecture. The proposed program, simulates functions of trusted cryptographic modules by software,...
Data geolocation in the cloud is becoming an increasingly pressing problem, aggravated by incompatible legislation in different jurisdictions and compliance requirements of data owners. In this work we present a mechanism allowing cloud users to control the geographical location of their data, stored or processed in plaintext on the premises of Infrastructure-as-a Service cloud providers. We use trusted...
Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust (established in the real world) in the organisation/individual that manages the digital resources. This concept evolved to deal with the rapid growth of the Internet, where it became...
Cloud computing has brought academic and industry tremendous benefits and improved computing efficiency compared with the traditional model, however, the adoption of this unique model also exacerbates security challenges and raises trust risks. And existing security solutions have less effectiveness and efficiency upon these unchartered cloud threats. We introduce trusted computing into current cloud...
With the increasing popularity of cloud services, attacks on the cloud infrastructure also increase dramatically. Especially, how to monitor the integrity of cloud execution environments is still a difficult task. In this paper, a real-time dynamic integrity validation (DIV) framework is proposed to monitor the integrity of virtual machine based execution environments in the cloud. DIV can detect...
According to the National classified protection of information system security requirements, the cloud computing systems classified above rank 3 is important information system, playing vital roles from the point of view of National Security. This paper develops a conceptual framework with which to address the protection of integrality protection named 'Dual Systems Architecture' to protect computing...
Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, the attackers can also use the cloud infrastructure for hosting malicious services and generating different types of attacks. In this paper we propose techniques for securing tenant transactions in the cloud.
Cloud computing offers an appealing business model and it is tempting for companies to delegate their IT services, as well as data, to the Cloud. But in Cloud environment, lacking of practical auditing party always put the users' data in danger. Users may suffer a serious data loss without any compensation for they have lost all their control on their data. We present in this paper a novel way to...
Real Time Operating System (RTOS) had emerged in the market for the past few decades to provide solutions over various platforms that range from embedded devices to more sophisticated electronic system such nuclear plant and spacecraft. The evolution of the design of operating systems continues to endure the need of diverse applications that run on various platforms. Recently, there was a new element...
Integrating system-level virtualization technology with Trusted Computing technology can significantly improve system security. The open-source virtual TPM facility, shipped with the open-source hyper visor Xen, aims to provide the illusion of a physical TPM to TPM-based trusted software executed in trusted virtual machines (TVMs) such that TPM-based trusted software works well in a TVM as in a native...
We introduce a model for secure managing virtual infrastructure in IaaS Cloud which called Trusted Private Virtual Data center (TVPDc). It can offer centralized management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. Additionally, we propose a hierarchical management framework and a TVPDc establishment and deployment protocol...
Trusted chain technology provides a good opportunity to guarantee software and data integrities on cloud computing platforms. However, trusted chain on current virtualization computing platforms expose some problems, such as non-continuous, difficult to evolve or customize, insecure to transmit for remote attestation. To address these issues, this paper proposes a new approach to construct, protect...
A key technology of cloud computing is virtualization, which can lead to reduce the total cost and increase the application flexibility. However along with these benefits come added security challenges. The extension of Trusted Computing to virtual environments can provide secure storage and ensure system integrity. In this paper, we describe and analyze several existing virtualization of TPM (vTPM)...
Cloud computing enables organizations to realize the commercial benefits while facing the new security issues. In this paper, we presents a security model for called the Trusted Private Virtual Data center (TVPDc) that offering centralized security management of the computing and storage resources distributed in different locations and physical machines within an IaaS cloud. The TVPDc model can satisfy...
In this paper we present an approach to add Remote Attestation capabilities to the Google Chrome OS platform. Our approach is based on the combination of two integral aspects of Chrome OS: (1) its Verified Boot procedure and (2) its extensible, app-based architecture. Verified Boot ensures the integrity of the static operating system base including firmware, kernel and user land code. The dynamic...
One of the most important benefits of virtualization is Virtual Machine (VM) migration. While the performance of live VM migration is well explored, the security aspects have received very little attention. The extension of trusted computing to virtual systems using vTPMs allows applications in the VM to use the vTPM for secure storage and reporting platform integrity. In this paper, we propose an...
Trusted transaction is becoming more and more important as malicious user or agent inside the network may compromise the upcoming transaction. Trusted Computing mutual remote attestation mechanism is a relative new approach to overcome this problem. But limited computation capability of TPM device on the sever side is an obvious bottleneck of scalable performance. by introducing a novel high efficient...
Remote attestation is one of the main topics in trusted computing research area. It has great significance in attesting trustworthiness of terminal platform and establishing remote trust relationship in distributed computing environment. Property-based attestation(PBA for short) is an emerging method in which binary integrity value has been replaced with secure property as the content to attest. PBA...
With a prevalence of pervasive computing, especially cloud computing, the software is at the core and play a vital role. This advance the security problem, so software trust is drawing increasing attention. Therefore, we need a unified trust relationship model between entities, which captures both the needs of the traditional computing world and the world of pervasive computing where the continuum...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.