Portable TPM based user Attestation Architecture for Cloud Environments

1
Mr. Pramod
Mr. Pramod
2
Dr. B R Prasad Babu
Dr. B R Prasad Babu

Send Message

To: Author

GJCST Volume 15 Issue B1

Article Fingerprint

ReserarchID

CSTB225U3

Portable TPM based user Attestation Architecture for Cloud Environments Banner
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Cloud computing is causing a major shift in the IT industry. Research indicates that the cloud computing industry segment is substantial and growing enormously. New technologies have been developed, and now there are various ways to virtualize IT systems and to access the needed applications on the Internet, through web based applications. Users, now can access their data any time and at any place with the service provided by the cloud storage. With all these benefits, security is always a concern. Even though the cloud provides accessing the data stored in cloud storage in a flexible and scalable manner, the main challenge it faces is with the security issues. Thus user may think it’s not secure since the encryption keys are managed by the software, therefore there is no attestation on the client software integrity. The cloud user who has to deploy in the reliable and secure environment should be confirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by the mischievous acts. Thus, the user identification which consists user ID and password can also be easily compromised. Apart from the traditional network security solutions, trusted computing technology is combined into more and more aspects of cloud computing environment to guarantee the integrity of platform and provide attestation mechanism for trustworthy services. Thus, enhancing the confidence of the IaaS provider.

14 Cites in Articles

References

  1. Sebastien Benoit Bertholon,Pascal Varrette,Bouvry (2011). CERTICLOUD: a Novel TPM-based Approach to Ensure Cloud IaaS Security.
  2. Farzadsabahi Cloud Computing Security Threats and Responses.
  3. Duflot (2009). Getting into the SMRAM: SMM reloaded.
  4. Hua Wang,Yao Guo,Xia Zhao,Xiangqun Chen (2008). Keep Passwords Away from Memory: Password Caching and Verification Using TPM.
  5. (2009). System programming guide.
  6. Danan Thilakanathan,Shiping Chen,Surya Nepal,Rafael Calvo,Dongxi Liu,John Zic (2014). Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices.
  7. V Varadharajan,U Tupakula (2012). TREASURE: Trust Enhanced Security for Cloud Environments.
  8. Jonathan Mccune,Bryan Parno,Adrian Perrig,Michael Reiter,Hiroshi Isozaki (2008). Flicker.
  9. Arm (2009). ARM Securtiy Technology, Building a Secure System using Trust Zone Technology.
  10. (2005). Software, specifications, and more: Where to find other TPM resource.
  11. Dan Boneh,Hovav Shacham (2004). Group signatures with verifier-local revocation.
  12. Tpm Unknown Title.
  13. S3 Amazon Using Data Encryption.
  14. R Popa,J Lorch,D Molnar,H Wang,L Zhuang (2011). Enabling Security in Cloud Storage SLAs with Cloud Proof.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

Mr. Pramod. 2015. \u201cPortable TPM based user Attestation Architecture for Cloud Environments\u201d. Global Journal of Computer Science and Technology - B: Cloud & Distributed GJCST-B Volume 15 (GJCST Volume 15 Issue B1): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
C.2.1, C.5.3
Version of record

v1.2

Issue date

March 17, 2015

Language

English

Experiance in AR

The methods for personal identification and authentication are no exception.

Read in 3D

The methods for personal identification and authentication are no exception.

Article Matrices
Total Views: 8168
Total Downloads: 2152
2026 Trends
Research Identity (RIN)
Related Research

Published Article

Cloud computing is causing a major shift in the IT industry. Research indicates that the cloud computing industry segment is substantial and growing enormously. New technologies have been developed, and now there are various ways to virtualize IT systems and to access the needed applications on the Internet, through web based applications. Users, now can access their data any time and at any place with the service provided by the cloud storage. With all these benefits, security is always a concern. Even though the cloud provides accessing the data stored in cloud storage in a flexible and scalable manner, the main challenge it faces is with the security issues. Thus user may think it’s not secure since the encryption keys are managed by the software, therefore there is no attestation on the client software integrity. The cloud user who has to deploy in the reliable and secure environment should be confirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by the mischievous acts. Thus, the user identification which consists user ID and password can also be easily compromised. Apart from the traditional network security solutions, trusted computing technology is combined into more and more aspects of cloud computing environment to guarantee the integrity of platform and provide attestation mechanism for trustworthy services. Thus, enhancing the confidence of the IaaS provider.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]
×

This Page is Under Development

We are currently updating this article page for a better experience.

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Portable TPM based user Attestation Architecture for Cloud Environments

Mr. Pramod
Mr. Pramod
Dr. B R Prasad Babu
Dr. B R Prasad Babu

Research Journals