11 results on '"Trusted service manager"'
Search Results
2. Scalable Availability Model
- Author
-
Noor, Talal H., Sheng, Quan Z., Bouguettaya, Athman, Noor, Talal H., Sheng, Quan Z., and Bouguettaya, Athman
- Published
- 2014
- Full Text
- View/download PDF
3. Design of a Secure Location Based Service for Mobile Cloud Applications
- Author
-
Navjeet Kumar and K. Meenakshi Sundaram
- Subjects
Trusted service manager ,Geotagging ,Upload ,business.industry ,Computer science ,Cloud base ,Location-based service ,Mobile search ,Cloud computing ,Android (operating system) ,business ,Computer network - Abstract
The impact of Location Based Services (LBS) in the mobile cloud paradigm has been huge. The location based services provide a great backbone to mobile cloud and ease the whole process of communication at a global level. Any location based cloud service is used in order to enhance the user’s accessibility and make the service more user-friendly. Using a cloud base location system can improve the quality of the data storage. The objective is creating a location based mobile cloud application in android platform. This application will be able to geo-tag captured images and upload them onto a cloud. The images that are uploaded in the cloud will be sorted according to their locality. The images in the cloud which are in public mode will be visible to a user when he is in the same locality of the picture’s geo tag.
- Published
- 2017
- Full Text
- View/download PDF
4. An Application-Oriented Efficient Encapsulation System for Trusted Software Development
- Author
-
Jing Zhan, Chunzi Chen, Mo Li, Jun Hu, and Zheng Tao
- Subjects
Trusted service manager ,Computer science ,business.industry ,Data_MISCELLANEOUS ,Software development ,Trusted Computing ,Trusted Network Connect ,law.invention ,law ,Embedded system ,Direct Anonymous Attestation ,Trusted client ,Trusted Platform Module ,business ,Hengzhi chip - Abstract
Trusted computing provides an efficient and practical way out for system security problems based on a trusted hardware, namely the root of trust, e.g., Trusted Platform Module TPM, Trusted Cryptographic Module TCM, Trusted Platform Control Module TPCM, so on and so forth. However, current applications calling for trusted functions have to use either the user-space trusted interfaces e.g., Trusted Software Stack TSS API or to implement customized APIs on top of the trusted hardware driver; both of them are well known of steep learning curve, which indicates error prone and low-efficient development and complex maintenance for the application of trusted software. This paper presents a new trusted encapsulation architecture and the proof-of-concept system with the aim to mitigate the gap between the current obscure trusted APIs and the actual trusted applications for trusted software development. Our system can provide high-level and much simplified trusted transaction interfaces for user applications, which can rapidly reduce the development and maintenance work for the developers and users without too much performance costs. We also present a secure remote login use-case using mainly the binding and unbinding trusted functions of our trusted encapsulation architecture.
- Published
- 2016
- Full Text
- View/download PDF
5. seTPM: Towards Flexible Trusted Computing on Mobile Devices Based on GlobalPlatform Secure Elements
- Author
-
Sergej Proskurin, Georg Sigl, and Michael Weiβ
- Subjects
Trusted service manager ,business.industry ,Computer science ,Trusted Computing ,Cryptographic protocol ,computer.software_genre ,Embedded system ,Operating system ,Trusted Platform Module ,Android (operating system) ,Java Card ,business ,Mobile device ,computer ,Hengzhi chip - Abstract
Insufficiently protected mobile devices present a ubiquitous threat. Due to severe hardware constraints, such as limited printed circuit board area, hardware-based security as proposed by the Trusted Computing Group is usually not part of mobile devices, yet. We present the design and implementation of seTPM, a secure element based TPM, utilizing Java Card technology. seTPM establishes trust in mobile devices by enabling Trusted Computing based integrity measurement services, such as IMA for Linux. Our prototype emulates TPM functionality on a GlobalPlatform secure element, which allows seamless integration into the Trusted Software Stack of Linux-based mobile operating systems like Android. With our work, we provide a solution to run Trusted Computing based security protocols while supplying a similar security level as provided by hardware TPM chips. In addition, due to the flexible design of the seTPM, we further increase the security level as we are able to selectively replace the outdated SHA-1 hash algorithm of TPM 1.2 specification by the present Keccak algorithm. Further, our architecture comprises hybrid support for the TPM 1.2 and TPM 2.0 specifications to simplify the transition towards the TPM 2.0 standard.
- Published
- 2016
- Full Text
- View/download PDF
6. Research on Trusted Bootstrap Based on the Universal Smart Card
- Author
-
Lin Yan and Jianbiao Zhang
- Subjects
Trusted service manager ,Computer science ,Data_MISCELLANEOUS ,Trusted Computing ,Computer security ,computer.software_genre ,Trusted Network Connect ,law.invention ,law ,Operating system ,Direct Anonymous Attestation ,Trusted client ,Trusted Platform Module ,Trusted timestamping ,computer ,Hengzhi chip - Abstract
The trusted boot is a hot spot in trusted computing field. User's identity authentication and trusted measurement are used to deal with security threats. But it is difficult to implement the general trusted boot based on hardware, which can be bypassed easily by software. In order to solve the above problem, a scheme of trusted boot is presented based on the universal smart card. It does not change the hardware and the firmware of the smart card and the terminal device. The core method combines user's identity authentication with trusted measurement. It binds user's identity, smart card and terminal device to ensure the trusted boot of terminal device. The trusted computing mechanism can be extended from power on to the application layer. Ultimately, experiments prove the security of boot and simplification of the implementation.
- Published
- 2016
- Full Text
- View/download PDF
7. A Proposed Strategy for Secure and Trusted Environment in e-Government
- Author
-
Yudi Prayudi and Tri Kuntoro Priyambodo
- Subjects
Trusted service manager ,Secure cryptoprocessor ,Computer science ,Direct Anonymous Attestation ,Trusted Platform Module ,Trusted Computing ,Computer security model ,Trusted Network Connect ,Computer security ,computer.software_genre ,Security policy ,computer - Abstract
The Internet as a primary means of the implementation of e-Government is an insecure channel and can provide a loophole, which allows the emergence of various types of threat and vulnerability. This becomes an obstacle in the efforts to increase the participation of the community and gives impacts in decreasing the trust in the system. Therefore, a strategy that involves technological as well as conceptual aspects needs to be carried to realize a secure and trusted environment on e-government. This paper gives an overview of the strategy based on security and trust in one comprehensive solution that can be applied to achieve the goal through the integration of five components, namely: security and standard, security policy, trusted computing, defense-in-depth strategy and human factor. Through this paper then all parties involved in e-government may reconsider a strategy that has been set up to give attention to the issue of secure and trust in the implementation of e-government system.
- Published
- 2015
- Full Text
- View/download PDF
8. Secure and Trusted Application Execution on Embedded Devices
- Author
-
Mehari G. Msgna, Raja Naeem Akram, and Konstantinos Markantonakis
- Subjects
010302 applied physics ,Trusted service manager ,Hardware security module ,business.industry ,Computer science ,02 engineering and technology ,Service provider ,Trusted Network Connect ,01 natural sciences ,020202 computer hardware & architecture ,Secure cryptoprocessor ,Embedded system ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Direct Anonymous Attestation ,Smart card ,Trusted Platform Module ,business - Abstract
Embedded devices have permeated into our daily lives and significant day-to-day mundane tasks involve a number of embedded systems. These include smart cards, sensors in vehicles and industrial automation systems. Satisfying the requirements for trusted, reliable and secure embedded devices is more vital than ever before. This urgency is also strengthened further by the potential advent of the Internet of Things and Cyber-Physical Systems. As our reliance on these devices is increasing, the significance of potential threats should not be underestimated, especially as a number of embedded devices are built to operate in malicious environments, where they might be in the possession of an attacker. The challenge to build secure and trusted embedded devices is paramount. In this paper, we examine the security threats to embedded devices along with the associated prevention mechanisms. We also present a holistic approach to the security and trust of embedded devices, from the hardware design, reliability and trust of the runtime environment to the integrity and trustworthiness of the executing applications. The proposed protection mechanisms provide a high degree of security at a minimal computational cost. Such an agnostic view on the security and trust of the embedded devices can be pivotal in their adoption and trust acquisition from the general public and service providers.
- Published
- 2015
- Full Text
- View/download PDF
9. Trusted Computing Platforms
- Author
-
Liqun Chen, Graeme John Proudler, and Chris I. Dalton
- Subjects
Trusted service manager ,Computer science ,Direct Anonymous Attestation ,Trusted Platform Module ,Trusted Computing ,Trusted Network Connect ,Computer security ,computer.software_genre ,computer - Published
- 2014
- Full Text
- View/download PDF
10. Trusted Platform Architecture
- Author
-
Liqun Chen, Chris I. Dalton, and Graeme John Proudler
- Subjects
Trusted service manager ,Computer science ,Component (UML) ,Direct Anonymous Attestation ,State (computer science) ,Trusted Platform Module ,Trusted Computing ,Isolation (database systems) ,Trusted Network Connect ,Computer security ,computer.software_genre ,computer - Abstract
All trusted platforms have some aspects in common. They require some form of excution isolation because that’s the only way to prevent a rogue application subverting another application. They need built-in trusted functions and credentials, because otherwise one can’t distinguish a rogue computing environment from a desired computing environment. All trusted platforms rely upon Roots of Trust that record platform integrity metrics in Platform Configuration Registers. This creates a chain of trust, which is a sophisticated form of auditing that allows verification that a platform’s state is the anticipated state. PCRs are built into Trusted Platform Modules, which are perhaps the most well-known component of Trusted Computing.
- Published
- 2014
- Full Text
- View/download PDF
11. Scalable Availability Model
- Author
-
Quan Z. Sheng, Athman Bouguettaya, and Talal H. Noor
- Subjects
Trusted service manager ,Difficult problem ,Service (business) ,Computer science ,business.industry ,Operational availability ,Data_MISCELLANEOUS ,Cloud computing ,Computer security ,computer.software_genre ,Scalability ,Trust management (information system) ,business ,computer - Abstract
Guaranteeing the availability of the trust management service is a difficult problem due to the unpredictable number of cloud service consumers and the highly dynamic nature of the cloud services. For example, if the trust management service is down for a while (e.g., overload or service update), the cloud service consumers will be unable to give feedbacks or inquire a trust assessment for cloud services. Consequently, approaches that require understanding of consumers’ interests and capabilities through similarity measurements or operational availability measurements (i.e., uptime to the total time) are inappropriate in the cloud environment. The trust management service should be adaptive and highly scalable to be functional in cloud environments.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.