Research on Hardware Security of Embedded System in Cloud Environment

Article Preview

Abstract:

Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud environment does not win enough attention. This paper analysis the security threats of it, and proposes a Secure Hardware Model to provide a tamper-resistant and more reliable hardware embedded platform in cloud environment. Our model adds some new components to traditional embedded system, controls the start sequence of platform’s components, verifies the integrity of crucial information for embedded platform and recovers the system if necessary. Our implementation demonstrates the feasibility of Secure Hardware Model, it enhance the secure and reliable boot of embedded system. With the constant development and application of embedded system in cloud computing field, our research will influence cloud computing greatly.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 488-489)

Pages:

1480-1487

Citation:

Online since:

March 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Gannon D: Head in the clouds. Nature, 449, (2007)

Google Scholar

[2] Shen Changxiang, Zhang Huanguo, Feng Dengguo, et al: Survey of Information Security. Science in China Series F, 50(3), pp.273-298, (2007)

Google Scholar

[3] Shen Changxiang, Zhang Huanguo, Wang Huaimin, et al. Research of Trusted Computing and its development. Science in China (information), 40, pp.139-166, (2010)

Google Scholar

[4] ZHAO Bo, ZHANG Huan-Guo, LI Jing, CHEN Lu, WEN Song. The System Architecture and Security Structure of Trusted PDA. Chinese Journal of Computers, 33(1), pp.82-92, (2010)

DOI: 10.3724/sp.j.1016.2010.00082

Google Scholar

[5] Xbox 360 hypervisor privilege escalation vulnerability," on http://www.honline.com/security/news/item/Xbox-360-hack-was-the-real-deal-732391.html. (2007)

Google Scholar

[6] CVE-2007-4993: Xen guest root can escape to domain 0 through pygrub," on http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2007-4993.(2007)

Google Scholar

[7] "CVE-2007-5497: Vulnerability in XenServer could result in privilege escalation and arbitrary code executionr," on http://support.citrix.com/article/CTX118766.(2007)

Google Scholar

[8] R. Wojtczuk, "Subverting the Xen hypervisor," BlackHat USA, 2008.

Google Scholar

[9] K. Kortchinsky, "Hacking 3D (and Breaking out of VMWare)," BlackHat USA, 2009.

Google Scholar

[10] Trusted Computing Group on http://www.trustedcomputinggroup.org, June (2004)

Google Scholar

[11] TCG Web Site on https://www.trustedcomputinggroup.org

Google Scholar

[12] TCG Specification list on https://www.trustedcomputinggroup.org/specs

Google Scholar

[13] TCG,"TPM Main Part 2 TPM Structures ", Specification Version 1.2. www.trustedcomputinggroup.org/. (2005)

Google Scholar

[14] LaGrande Technology Architectural Overview," on http:// www.intel.com/technology/security/. (2003)

Google Scholar

[15] Microsoft, "Next-Generation Secure Computing Base," on http:// www.microsoft.com/resources/ngscb/. (2004)

Google Scholar

[16] J. Camenisch: Better Privacy for Trusted Computing Platforms. Proceedings of ESORICS 2004, LNCS 3193, Springer-Verlag , pp.73-88, (2004)

Google Scholar

[17] T. Eisenbarth, T. Güneysu, C. Paar: Reconfigurable Trusted Computing in Hardware, Proceedings of STC'07, ACM Press, pp.15-20, (2007)

DOI: 10.1145/1314354.1314360

Google Scholar

[18] P. James, D. Rivera: Systems, Methods, and Media for Accessing TPM Keys, US2006129824. (2004)

Google Scholar

[19] Z. Yan, P. Cofta: A Mechanism for Trust Sustainability Among Trusted Computing Platforms, Proceedings of TrustBus 2004, LNCS 3184, Springer-Verlag, pp.11-19,( 2004)

DOI: 10.1007/978-3-540-30079-3_2

Google Scholar

[20] TCG. TCG mobile trusted module specification version 1.0[EB/OL].Oregon:TCG,2007 [2007209201]. http://www.trusted computinggroup.org/specs/mobilephone/tcg2mobile2t rusted2module 21.0.pdf .

DOI: 10.1016/b978-075067960-2/50002-6

Google Scholar

[21] ZHENG Yu,HE Da-Ke,HE Ming-Xing: Trusted Computing Based User Authentication for Mobile Equipment. Chinese Journal of Computers ,29 (8) , p.1255 – 1264,( 2006)

Google Scholar

[22] CHEN Shu-yi, WEN Ying-you, ZHAO Hong: Conceptual Design of Trusted Mobile Platform. Journal of Northeastern University(Natural Science), Vol129 ,No. 8 Aug, (2008)

Google Scholar

[23] WANG Yu, WANG Zhen-yu, YAO Li-ning: Design and implementation of TPM extension and trusted bootstrap on embedded platform. Computer Engineering and Design, 30 (9), pp.2089-2091, (2009)

Google Scholar

[24] Sun Yong, Chen Wei, Yang Yixian: Trust Computing of Embedded System. China Information Tion Security, 2006.9, pp.50-52, (2006)

Google Scholar

[25] P. Gutmann,: An Open-source Cryptographic Coprocessor, Proc. of 2000 USENIX Security Symp., (2000)

Google Scholar

[26] D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz: Architectural Support for Copy and Tamper Resistant Software, Proc. of the 9th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems (ASPLOS-IX)., pp.168-177, (2000)

DOI: 10.1145/378993.379237

Google Scholar

[27] G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas: AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing, Proc. of the 17th Int'l Conf. on Supercomputing (ICS), (2003)

DOI: 10.1145/782814.782838

Google Scholar