A novel architecture to virtualise a hardware-bound trusted platform module

被引:1
|
作者
De Benedictis, Marco [1 ]
Jacquin, Ludovic [2 ]
Pedone, Ignazio [1 ]
Atzeni, Andrea [1 ]
Lioy, Antonio [1 ]
机构
[1] Politecn Torino, Dip Automat & Informat, Corso Duca Degli Abruzzi 24, I-10129 Turin, Italy
[2] Hewlett Packard Enterprise, Hewlett Packard Labs, Bristol BS34 8QZ, England
基金
欧盟地平线“2020”;
关键词
Computer security; Trust management; Platform virtualization; Cloud computing security; Trusted computing; Trusted platform module;
D O I
10.1016/j.future.2023.08.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security and trust are particularly relevant in modern softwarised infrastructures, such as cloud environments, as applications are deployed on platforms owned by third parties, are publicly accessible on the Internet and can share the hardware with other tenants. Traditionally, operating systems and applications have leveraged hardware tamper-proof chips, such as the Trusted Platform Modules (TPMs) to implement security workflows, such as remote attestation, and to protect sensitive data against software attacks. This approach does not easily translate to the cloud environment, wherein the isolation provided by the hypervisor makes it impractical to leverage the hardware root of trust in the virtual domains. Moreover, the scalability needs of the cloud often collide with the scarce hardware resources and inherent limitations of TPMs. For this reason, existing implementations of virtual TPMs (vTPMs) are based on TPM emulators. Although more flexible and scalable, this approach is less secure. In fact, each vTPM is vulnerable to software attacks both at the virtualised and hypervisor levels. In this work, we propose a novel design for vTPMs that provides a binding to an underlying physical TPM; the new design, akin to a virtualisation extension for TPMs, extends the latest TPM 2.0 specification. We minimise the number of required additions to the TPM data structures and commands so that they do not require a new, non-backwards compatible version of the specification. Moreover, we support migration of vTPMs among TPM-equipped hosts, as this is considered a key feature in a highly virtualised environment. Finally, we propose a flexible approach to vTPM object creation that protects vTPM secrets either in hardware or software, depending on the required level of assurance.(c) 2023 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
引用
收藏
页码:21 / 36
页数:16
相关论文
共 50 条
  • [21] Formal analysis and testing of trusted platform module
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
    不详
    Jisuanji Xuebao, 2009, 4 (646-653):
  • [22] A Generalized Trusted Virtualized Platform Architecture
    Ruan, Anbang
    Shen, Qingni
    Yin, Yuanyou
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2340 - 2346
  • [23] Feasibility Study of Dynamic Trusted Platform Module
    Kanuparthi, Arun K.
    Zahran, Mohamed
    Karri, Ramesh
    2010 IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN, 2010, : 350 - 355
  • [24] Using Trusted Platform Module to Mitigate SSL Stripping
    Nor, Fazli Mat
    Jalil, Kamarularifin Abd
    Abd Kadir, Adzhar
    Ab Manan, Jamalul-lail
    2013 IEEE CONFERENCE ON OPEN SYSTEMS (ICOS), 2013, : 237 - +
  • [25] Authentication of Trusted Platform Module Using Processor Response
    Rai, Vikash Kumar
    Mishra, Arun
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 325 - 334
  • [26] FPGA-based trusted platform module attack
    Jiang, W. (j8w8@sohu.com), 1600, Beijing University of Technology (39):
  • [27] Implementation of ECC-based trusted platform module
    Zhang, Xing
    Zhou, Ming
    Zhijang, Jun-Xi
    Li, Man
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2168 - 2173
  • [28] A software-based Trusted Platform Module emulator
    Strasser, Mario
    Stamer, Heiko
    TRUSTED COMPUTING - CHALLENGES AND APPLICATIONS, PROCEEDINGS, 2008, 4968 : 33 - +
  • [29] A Design of Virtual Trusted Platform Module for Windows System
    Chen Du
    Mao Junjie
    Fang Juan
    2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3, 2011, : 508 - 511
  • [30] Erzeugung elektronischer Signaturen mittels Trusted Platform Module
    Frederic Stumpf
    Markus Sacher
    Alexander Roßnagel
    Claudia Eckert
    Datenschutz und Datensicherheit - DuD, 2007, 31 (5) : 357 - 361