Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1866307.1866419acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

A portable TPM based on USB key

Published: 04 October 2010 Publication History
  • Get Citation Alerts
  • Abstract

    Trusted computing technology aims to enhance the security of platform by the TPM. But there are some drawbacks of TCG's Trusted Computing architecture for user-based applications. This paper presents a new concept of portable TPM (PTM) based on USB Key to solve those problems. At first, we use PTM to establish a trusted path between the verifier and the user in remote attestation so as to propagate the trust chain to the end user. Secondly, we design the trust model and platform management mechanism of PTM. In this model the single point failure of TPM and frequent sensitive data migrations between different platforms are avoided based on PTM. At last, we implement the PTM on the USB Key with Java Card Runtime Environment. The test results show that the PTM scheme is feasible for user-based application.

    References

    [1]
    }}Trusted Computing Group, Trusted Platform Modules Strengthen User and Platform Authenticity, http://www.trustedcomputinggroup.org, 2005
    [2]
    }}Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn. Turtles All The Way Down: Research Challenges in User-Based Attestation, Proceedings of the 2nd USENIX workshop on Hot Topics in Security, USENIX, Boston, USA, 2007
    [3]
    }}Sun Microsystems Inc. Java Card Platform Specification 2.2.2. http://java.sun.com/javacard/specs.html, 2006.
    [4]
    }}TCG, TPM Main Part 3 Commands, http://www.trustedcomputinggroup.org, 2006
    [5]
    }}Dawei Zhang, Peng Hu, Trusted e-commerce user agent based on USB Key, IMECS, Hongkong, China, 2008
    [6]
    }}Lei Han, Jiqiang Liu, Dawei Zhang, A Portable TPM Scheme for General-purpose Trusted Computing Based on EFI, International Conference on Multimedia Information Networking and Security,IEEE, Wuhan, China, 2009

    Cited By

    View all
    • (2021)Building a Secure Video Conference System with Customized Cryptographic USB KeysICC 2021 - IEEE International Conference on Communications10.1109/ICC42927.2021.9500888(1-6)Online publication date: Jun-2021
    • (2018)Using mobile phones to enhance computing platform trustTelecommunications Systems10.1007/s11235-018-0456-y69:2(187-205)Online publication date: 1-Oct-2018
    • (2017)Towards the Security of Motion Detection-based Video Surveillance on IoT DevicesProceedings of the on Thematic Workshops of ACM Multimedia 201710.1145/3126686.3126713(228-235)Online publication date: 23-Oct-2017
    • Show More Cited By

    Index Terms

    1. A portable TPM based on USB key

      Recommendations

      Reviews

      Amos O Olagunju

      Despite the Trusted Computing Group's specifications on security chips for storing cryptographic keys to protect information in trusted platform modules (TPMs), trusted computing between users and remote devices and verifiers poses major vulnerability challenges. The traditional TPM architectures create hash key summaries of hardware and software configurations to physically bind TPMs to specific hardware platforms, thus allowing business organizations to process electronic transactions securely. However, the secure transfer of keys among public endpoint platforms is still a major problem, despite the recently proposed architecture for a mobile TPM [1]. How should the issue of binding one TPM to a platform and several users to one TPM be resolved__?__ Zhang et al. propose a portable TPM (PTM) that: establishes trust with specific verifier devices in user-based TPM applications; assures that the trust chain is relayed back to users; performs remote verification and integrity assessment to reinstate secure data and keys; and overcomes the obligation of secure data to be bound to only a specific device. In the PTM paradigm, one user and several devices share one PTM. The PTM uses a protocol to establish a trusted path with the remote verifier and executes an encryption algorithm to certify the integrity of communication results. The PTM serves as a trusted backup module once it is the original TPM. The TPM utilizes the low pin count (LPC) bus, but the PTM exploits the universal serial bus (USB). The authors implemented a prototype PTM equipped with commands and program units that support the construction and activation of identities, rights administration, platform management, key storage and management, data encryption, integrity compilation, and details. The response times of the PTM commands varied between 0.66 and 94.64 milliseconds, with the majority of the commands executing in less than two milliseconds. The authors present realistic evidence to support the claim that a PTM based on a USB key is a special way to complement TPM with security and platform management routines that augment the overall security of user-based applications. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
      October 2010
      782 pages
      ISBN:9781450302456
      DOI:10.1145/1866307

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 October 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. java card
      2. trusted computing
      3. trusted platform module

      Qualifiers

      • Poster

      Conference

      CCS '10
      Sponsor:

      Acceptance Rates

      CCS '10 Paper Acceptance Rate 55 of 325 submissions, 17%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)22
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 12 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Building a Secure Video Conference System with Customized Cryptographic USB KeysICC 2021 - IEEE International Conference on Communications10.1109/ICC42927.2021.9500888(1-6)Online publication date: Jun-2021
      • (2018)Using mobile phones to enhance computing platform trustTelecommunications Systems10.1007/s11235-018-0456-y69:2(187-205)Online publication date: 1-Oct-2018
      • (2017)Towards the Security of Motion Detection-based Video Surveillance on IoT DevicesProceedings of the on Thematic Workshops of ACM Multimedia 201710.1145/3126686.3126713(228-235)Online publication date: 23-Oct-2017
      • (2016)An ID-based node key management scheme based on PTPM in MANETsSecurity and Communication Networks10.1002/sec.12069:15(2816-2826)Online publication date: 1-Oct-2016
      • (2015)seTPMRevised Selected Papers of the 14th International Conference on Smart Card Research and Advanced Applications - Volume 951410.1007/978-3-319-31271-2_4(57-74)Online publication date: 4-Nov-2015
      • (2013)TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security ApplicationsTrust and Trustworthy Computing10.1007/978-3-642-38908-5_10(133-141)Online publication date: 2013
      • (2013)Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer PlatformNetwork and System Security10.1007/978-3-642-38631-2_23(307-320)Online publication date: 2013

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media