2 research outputs found
Recent trends in applying TPM to cloud computing
Trusted platform modules (TPM) have become important safeâguards against
variety of softwareâbased attacks. By providing a limited set of
cryptographic services through a wellâdefined interface, separated from
the software itself, TPM can serve as a root of trust and as a building
block for higherâlevel security measures. This article surveys the
literature for applications of TPM in the cloudâcomputing environment,
with publication dates comprised between 2013 and 2018. It identifies
the current trends and objectives of this technology in the cloud, and
the type of threats that it mitigates. Toward the end, the main research
gaps are pinpointed and discussed. Since integrity measurement is one
of the main usages of TPM, special attention is paid to the assessment
of run time phases and software layers it is applied to.</p
Integrated Security for Services Hosted in Virtual Environments
In this paper, we introduce an integrated security architecture that combines TPM based trust management with hypervisor level access control and intrusion detection system to provide a holistic approach for securing services hosted in virtualised environments. We describe the implementation of the security architecture in detail and demonstrate the functionality of the proposed architecture for different attack scenarios. Our architecture is able to perform dynamic attack detection and update the security policies to protect the services from the identified threats. The proposed integrated security architecture can be easily adopted to be used in cloud and distributed virtualised environments