Open Access Open Access  Restricted Access Subscription Access

Trusted Platform Module Based User Attestation Architecture for Cloud Infrastructure


Affiliations
1 CSE Department, EPCET, VTU, Bangalore, India
2 CSE Department, EPCET, Bangalore, India
 

Cloud computing is s major shift in the IT industry. Many Research topics indicate that the cloud computing industry is substantial and growing rapidly. Numerous technologies have been developed, and now there are many ways to virtualizes IT systems and to get the needed applications on the Internet, through web based applications. Cloud users now can avail their data any time and at any place with Cloud Storage service. With all various benefits of cloud computing, security is always a major concern. Despite the fact that the cloud computing gives getting to the information put away in distributed storage in an adaptable and versatile way, the primary test it countenances is with the security issues. Thus cloud user may think cloud in not secure, because the encryption keys are completely managed by the software; hence there is no attestation on the integrity of client software. The cloud users who needs to send in the dependable and secure environment ought to be affirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by mischievous acts. Thus, the traditional user identification such as user ID and password can be easily compromised. Besides from the traditional network security solutions, (TCG) trusted computing technology is combined into cloud computing environment to make ensure that the integrity key of platform and offer attestation mechanism for trustworthy services. Thus, enhance the confidence of the IaaS provider. The cryptographic convention received by the Trusted Computing Group empowers the remote confirmation which protects the security of the user in view of the trusted stage. Hence we propose a structure which characterizes Trusted Platform Module (TPM), a trusted registering bunch which demonstrates the protected information access control in the cloud storage with enhance security. In this paper, we define the TPM-enabled key management, remote user attestation and a secure sharing of key across multiple users. We also study various challenges with the current TPM based attestation based techniques. The Portable TPM which is proposed in this paper is not embedded to VMS (Virtual Machines) in order to offer efficiency to the cloud users. Utilizing this methodology, security of the user is taken care in efficient way. We demonstrate proposed scheme effectiveness and efficiency, through extensive experimental evaluation on the live Microsoft Windows Azure platform.

Keywords

TPM, IaaS, vTPM, cTPM, SMRR, SMM, TCG, TED, DRTM, VLR, DRTM, CA.
User
Notifications
Font Size

Abstract Views: 204

PDF Views: 0




  • Trusted Platform Module Based User Attestation Architecture for Cloud Infrastructure

Abstract Views: 204  |  PDF Views: 0

Authors

Pramod
CSE Department, EPCET, VTU, Bangalore, India
B. R. Prasad Babu
CSE Department, EPCET, Bangalore, India

Abstract


Cloud computing is s major shift in the IT industry. Many Research topics indicate that the cloud computing industry is substantial and growing rapidly. Numerous technologies have been developed, and now there are many ways to virtualizes IT systems and to get the needed applications on the Internet, through web based applications. Cloud users now can avail their data any time and at any place with Cloud Storage service. With all various benefits of cloud computing, security is always a major concern. Despite the fact that the cloud computing gives getting to the information put away in distributed storage in an adaptable and versatile way, the primary test it countenances is with the security issues. Thus cloud user may think cloud in not secure, because the encryption keys are completely managed by the software; hence there is no attestation on the integrity of client software. The cloud users who needs to send in the dependable and secure environment ought to be affirmed from the Infrastructure as a Service (IaaS) that it has not been corrupted by mischievous acts. Thus, the traditional user identification such as user ID and password can be easily compromised. Besides from the traditional network security solutions, (TCG) trusted computing technology is combined into cloud computing environment to make ensure that the integrity key of platform and offer attestation mechanism for trustworthy services. Thus, enhance the confidence of the IaaS provider. The cryptographic convention received by the Trusted Computing Group empowers the remote confirmation which protects the security of the user in view of the trusted stage. Hence we propose a structure which characterizes Trusted Platform Module (TPM), a trusted registering bunch which demonstrates the protected information access control in the cloud storage with enhance security. In this paper, we define the TPM-enabled key management, remote user attestation and a secure sharing of key across multiple users. We also study various challenges with the current TPM based attestation based techniques. The Portable TPM which is proposed in this paper is not embedded to VMS (Virtual Machines) in order to offer efficiency to the cloud users. Utilizing this methodology, security of the user is taken care in efficient way. We demonstrate proposed scheme effectiveness and efficiency, through extensive experimental evaluation on the live Microsoft Windows Azure platform.

Keywords


TPM, IaaS, vTPM, cTPM, SMRR, SMM, TCG, TED, DRTM, VLR, DRTM, CA.