Abstract
Embedded systems are gradually evolving into alternatives to desktop and server systems in terms of performance, energy- and cost efficiency. Moreover, with the improvement of their performance and storage capabilities, they are about to enter the domain of desktop systems and cloud computing. However, the question remains whether such systems can be used in cloud computing scenarios in a secure and energy efficient way or not and, if this is not the case, how do they have to be enhanced and which components are missing. In this paper, we present an approach to how cloud computing can be realized securely on embedded systems by means of embedded Trusted Computing. We provide a reference design of a micro-data-center and present an analysis covering the topics of performance, security as well as energy consumption. Moreover, we discuss our concept for a light-weight virtualization framework which is specifically tailored to the requirements of embedded systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ARM Ltd.: Cortex-A15 Processor, http://www.arm.com/products/processors/cortex-a/cortex-a15.php5
Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., Zaharia, M.: A view of cloud computing. Commun. ACM 53, 50–58 (2010)
Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009, p. 3. USENIX Association, Berkeley (2009)
Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the linux operating system. In: Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference, pp. 29–42. USENIX Association, Berkeley (2001)
Sailer, R., Zhang, X., Jaeger, T., van Doorn, L.: Design and implementation of a tcg-based integrity measurement architecture. In: Proceedings of the 13th Conference on USENIX Security Symposium. SSYM 2004, vol. 13, p. 16. USENIX Association, Berkeley (2004)
Watson, R.N.M.: Exploiting concurrency vulnerabilities in system call wrappers. In: Proceedings of the First USENIX Workshop on Offensive Technologies, pp. 1–2. USENIX Association, Berkeley (2007)
Garfinkel, T.: Traps and Pitfalls: Practical Problems in in System Call Interposition based Security Tools. In: Proc. Network and Distributed Systems Security Symposium (February 2003)
Langley, A.: seccomp: Add bitmask of allowed system calls. Posted on linux kernel mailinglist (May 2009), http://lwn.net/Articles/332438/
Corbet, J.: Tracing: no shortage of options (July 2008), http://lwn.net/Articles/291091/
Noe, D.: sys socketcall: Network systems calls on Linux (April 2008), http://isoamerica.net/~dpn/socketcall1.pdf
Trusted Computing Group - Mobile Phone Working Group: TCG Mobile Reference Architecture, Specification version 1.0 Revision 1 (June 12, 2007)
Alves, T., Felton, D.: TrustZone: Integrated Hardware and Software Security - Enabling Trusted Computing in Embedded Systems (July 2004), http://www.arm.com/pdfs/TZ_Whitepaper.pdf
Dietrich, K., Winter, J.: Implementation aspects of mobile and embedded trusted computing. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 29–44. Springer, Heidelberg (2009)
Dietrich, K., Winter, J.: Secure boot revisited. In: The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp. 2360–2365 (November 2008)
Jan-Erik Ekberg, M.K.: Mobile Trusted Module (MTM) - an introduction (Noverber 14, 2007), http://research.nokia.com/files/NRCTR2007015.pdf
FreeScale: MCIMX51 Multimedia Applications Processor Reference Manual, http://cache.freescale.com/files/dsp/doc/ref_manual/MCIMX51RM.pdf?fsrch=1&sr=5
Trusted Computing Group - TPM Working Group: TPM Main Part 3 Commands, Specification version 1.2 Level 2 Revision 103 (July 9, 2007)
Winter, J.: Trusted computing building blocks for embedded linux-based arm trustzone platforms. In: STC 2008: Proceedings of the 3rd ACM workshop on Scalable Trusted Computing, pp. 21–30. ACM, New York (2008)
Dietrich, K., Winter, J.: Towards customizable, application specific mobile trusted modules. In: Proceedings of the Fifth ACM Workshop on Scalable Trusted Computing, STC 2010, pp. 31–40. ACM, New York (2010)
Trusted Computing Group, https://members.trustedcomputinggroup.org
Dietrich, K.: Anonymous client authentication for transport layer security. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 268–280. Springer, Heidelberg (2010)
Reiter, A., Neubauer, G., Kapferberger, M., Winter, J., Dietrich, K.: Seamless integration of trusted computing into standard cryptographic frameworks. In: The Second International Conference on Trusted Systems, INTRUST 2010, pp. 21–30. Springer, New York (2011)
Gumstix inc.: Gumstix product specification, http://gumstix.com/ )
Gumstix inc.: robostix-TH product description, http://www.gumstix.com/store/catalog/product_info.php?products_id=142
Trusted-Computing-Group-TSS-Working-Group: TCG Software Stack (TSS) Specification Version 1.2 Level 1. Specification available online at (2006), https://www.trustedcomputinggroup.org/specs/TSS/TSS_Version_1.2_Level_1_FINAL.pdf Part1: Commands and Structures
ARM Ltd.: RealView Versatile Express product specification
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dietrich, K., Winter, J. (2011). Towards a Trustworthy, Lightweight Cloud Computing Framework for Embedded Systems. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, AR., Sasse, A., Beres, Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21599-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-21599-5_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21598-8
Online ISBN: 978-3-642-21599-5
eBook Packages: Computer ScienceComputer Science (R0)