Skip to main content

Development of m-TMS for Trusted Computing in Mobile Cloud

  • Conference paper
Advances in Grid and Pervasive Computing (GPC 2012)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7296))

Included in the following conference series:

  • 1891 Accesses

Abstract

In this rapidly changing IT society, computer system security is very crucial. This system security applies not only to individuals’ computer systems but also to cloud environments. “Cloud” concerns operations on the web; therefore it is exposed to a lot of risks and security of its spaces where data are stored is vulnerable. Accordingly, in order to reduce factors of threat to security, the TCG (Trusted Computing Group) proposed a highly reliable platform based on a semiconductor-chip, TPM(Trusted Platform Module). Therefore, this paper proposes a m-TMS (Mobile Trusted Monitoring System) that monitors trusted state of a computing environment on which TPM chip-based TPB (Trusted Platform Board) is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. m-TMS is provided to users so that system resources of CPU, RAM, and process, the objects of monitoring in a computer system, may be monitored. Moreover, converting and detouring of single entities like PC or target addresses, which are attack pattern methods that pose a threat to computer system security, are combined. Branch instruction trace function is monitored using a BiT (Branch Instruction Trace) Profiling tool through which processes attacked or those suspected of being attacked may be traced, enabling users to actively respond.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Trusted Computing Group Web Site, http://www.trustedcomputinggroup.org

  2. TCG Specification Architecture Overview Specification Revision 1.4, Trusted Computing Group (TCG) (2007)

    Google Scholar 

  3. Common Criteria, Trusted Computing Group (TCG) Personal Computer (PC) Specific Trusted Building Block (TBB) Protection Profile and TCG PC Specific TBB With Maintenance Protection Profile (2004)

    Google Scholar 

  4. Lin, H., Lee, G.: Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace. Journal of Information Security 1(1), 1–10 (2010)

    Article  Google Scholar 

  5. IBM, Integrity Measurement Architecture (IMA), http://domino.research.ibm.com/comm/researchpeople.nsf/pages/sailer.ima.html

  6. Jeong, Y.-S., Park, J.H.: Visual Trustworthy Monitoring System (v-TMS) for Behavior of Trusted Computing. Journal of Internet Technology 11(6), 731–741 (2010)

    Google Scholar 

  7. Suh, G., O’Donnell, C., Sachdev, I., Devadas, S.: Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions. Technical Report, MIT CSAIL CSG Technical Memo 483 (2004)

    Google Scholar 

  8. Alves, T., Felton, D.: Trustzone: Integrated Hardware and Software Security. ARM white paper (2004)

    Google Scholar 

  9. Halfhill, T.: ARM Dons Armor: TrustZone Security Extensions Strengthen ARMv6 Architecture. Microprocessor Report (2003)

    Google Scholar 

  10. Crandall, J., Chong, F.: Minos: Control Data Attack Prevention Orthogonal To Memory Model. In: Proc. the 37th Int’l. Symp. on Micro Architecture (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, HW., Song, EH., Kim, JH., Park, S.O., Jeong, YS. (2012). Development of m-TMS for Trusted Computing in Mobile Cloud. In: Li, R., Cao, J., Bourgeois, J. (eds) Advances in Grid and Pervasive Computing. GPC 2012. Lecture Notes in Computer Science, vol 7296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30767-6_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30767-6_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30766-9

  • Online ISBN: 978-3-642-30767-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics