Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis
{"title":"使用硬件完整性认证协议防御基于硬件的可信计算攻击","authors":"Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis","doi":"10.1145/3134302.3134320","DOIUrl":null,"url":null,"abstract":"As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this work, we aim to discuss the Trusted Computing approaches applied on Cloud Computing security and focusing on their drawbacks on hardware verification (i.e., to attest hardware's integrity). We propose a model for hardware integrity attestation applied on Cloud Computing systems, presenting the main protocol based on the use of Endorsement Keys (EK) known from Trusted Computing. The validity of our protocol and its potentials against hardware-based attacks is proved by the combined use of verified Public-Key encryption algorithms.","PeriodicalId":131196,"journal":{"name":"Proceedings of the 18th International Conference on Computer Systems and Technologies","volume":"27 6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol\",\"authors\":\"Anna Mpanti, Stavros D. Nikolopoulos, Iosif Polenakis\",\"doi\":\"10.1145/3134302.3134320\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this work, we aim to discuss the Trusted Computing approaches applied on Cloud Computing security and focusing on their drawbacks on hardware verification (i.e., to attest hardware's integrity). We propose a model for hardware integrity attestation applied on Cloud Computing systems, presenting the main protocol based on the use of Endorsement Keys (EK) known from Trusted Computing. The validity of our protocol and its potentials against hardware-based attacks is proved by the combined use of verified Public-Key encryption algorithms.\",\"PeriodicalId\":131196,\"journal\":{\"name\":\"Proceedings of the 18th International Conference on Computer Systems and Technologies\",\"volume\":\"27 6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-23\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 18th International Conference on Computer Systems and Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3134302.3134320\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 18th International Conference on Computer Systems and Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3134302.3134320","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Defending Hardware-based Attacks on Trusted Computing using a Hardware-Integrity Attestation Protocol
As long as the use of distributed systems and Cloud Computing is significantly increasing, the amount of threats concerning the security of such systems and the data stored in them set great challenges on the application of Trusted Computing. In this work, we aim to discuss the Trusted Computing approaches applied on Cloud Computing security and focusing on their drawbacks on hardware verification (i.e., to attest hardware's integrity). We propose a model for hardware integrity attestation applied on Cloud Computing systems, presenting the main protocol based on the use of Endorsement Keys (EK) known from Trusted Computing. The validity of our protocol and its potentials against hardware-based attacks is proved by the combined use of verified Public-Key encryption algorithms.