Recent Trends in Applying TPM to Cloud Computing
Autor(a) principal: | |
---|---|
Data de Publicação: | 2019 |
Outros Autores: | , , |
Tipo de documento: | Artigo |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10400.6/9233 |
Resumo: | Trusted platform modules (TPM) have become important safe-guards against variety of software-based attacks. By providing a limited set of cryptographic services through a well-defined interface, separated from the software itself, TPM can serve as a root of trust and as a building block for higher-level security measures. This article surveys the literature for applications of TPM in the cloud-computing environment, with publication dates comprised between 2013 and 2018. It identifies the current trends and objectives of this technology in the cloud, and the type of threats that it mitigates. Toward the end, the main research gaps are pinpointed and discussed. Since integrity measurement is one of the main usages of TPM, special attention is paid to the assessment of run time phases and software layers it is applied to. |
id |
RCAP_3b737d6f3fcb65652466b050256be6ea |
---|---|
oai_identifier_str |
oai:ubibliorum.ubi.pt:10400.6/9233 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Recent Trends in Applying TPM to Cloud ComputingCloud computingSecurityTrusted computingTrusted platform modulesTrusted platform modules (TPM) have become important safe-guards against variety of software-based attacks. By providing a limited set of cryptographic services through a well-defined interface, separated from the software itself, TPM can serve as a root of trust and as a building block for higher-level security measures. This article surveys the literature for applications of TPM in the cloud-computing environment, with publication dates comprised between 2013 and 2018. It identifies the current trends and objectives of this technology in the cloud, and the type of threats that it mitigates. Toward the end, the main research gaps are pinpointed and discussed. Since integrity measurement is one of the main usages of TPM, special attention is paid to the assessment of run time phases and software layers it is applied to.WileyuBibliorumHosseinzadeh, ShohrehSequeiros, Joao B. F.Inácio, Pedro R. M.Leppänen, Ville2020-02-12T12:16:09Z2019-112019-11-01T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/articleapplication/pdfhttp://hdl.handle.net/10400.6/9233enghttps://doi.org/10.1002/spy2.93metadata only accessinfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2023-12-15T09:50:08Zoai:ubibliorum.ubi.pt:10400.6/9233Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-20T00:49:25.291226Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Recent Trends in Applying TPM to Cloud Computing |
title |
Recent Trends in Applying TPM to Cloud Computing |
spellingShingle |
Recent Trends in Applying TPM to Cloud Computing Hosseinzadeh, Shohreh Cloud computing Security Trusted computing Trusted platform modules |
title_short |
Recent Trends in Applying TPM to Cloud Computing |
title_full |
Recent Trends in Applying TPM to Cloud Computing |
title_fullStr |
Recent Trends in Applying TPM to Cloud Computing |
title_full_unstemmed |
Recent Trends in Applying TPM to Cloud Computing |
title_sort |
Recent Trends in Applying TPM to Cloud Computing |
author |
Hosseinzadeh, Shohreh |
author_facet |
Hosseinzadeh, Shohreh Sequeiros, Joao B. F. Inácio, Pedro R. M. Leppänen, Ville |
author_role |
author |
author2 |
Sequeiros, Joao B. F. Inácio, Pedro R. M. Leppänen, Ville |
author2_role |
author author author |
dc.contributor.none.fl_str_mv |
uBibliorum |
dc.contributor.author.fl_str_mv |
Hosseinzadeh, Shohreh Sequeiros, Joao B. F. Inácio, Pedro R. M. Leppänen, Ville |
dc.subject.por.fl_str_mv |
Cloud computing Security Trusted computing Trusted platform modules |
topic |
Cloud computing Security Trusted computing Trusted platform modules |
description |
Trusted platform modules (TPM) have become important safe-guards against variety of software-based attacks. By providing a limited set of cryptographic services through a well-defined interface, separated from the software itself, TPM can serve as a root of trust and as a building block for higher-level security measures. This article surveys the literature for applications of TPM in the cloud-computing environment, with publication dates comprised between 2013 and 2018. It identifies the current trends and objectives of this technology in the cloud, and the type of threats that it mitigates. Toward the end, the main research gaps are pinpointed and discussed. Since integrity measurement is one of the main usages of TPM, special attention is paid to the assessment of run time phases and software layers it is applied to. |
publishDate |
2019 |
dc.date.none.fl_str_mv |
2019-11 2019-11-01T00:00:00Z 2020-02-12T12:16:09Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/article |
format |
article |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10400.6/9233 |
url |
http://hdl.handle.net/10400.6/9233 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
https://doi.org/10.1002/spy2.93 |
dc.rights.driver.fl_str_mv |
metadata only access info:eu-repo/semantics/openAccess |
rights_invalid_str_mv |
metadata only access |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
Wiley |
publisher.none.fl_str_mv |
Wiley |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799136386443378688 |