@inproceedings{06badd55b4074ba5ac78b68da3db342b,
title = "Using TPM Secure Storage in Trusted High Availability Systems",
abstract = "We consider the problem of providing trusted computing functionality in high availability systems. We consider the case where data is required to be encrypted with a TPM protected key. For redundancy, and to facilitate high availability, the same TPM key is stored in multiple computational units, each one ready to take over if the main unit breaks down. This requires the TPM key to be migratable. We show how such systems can be realized using the secure storage of the TPM. Hundreds of millions TPM 1.2 chips have been shipped but with the recent introduction of TPM 2.0, more manufacturers are expected to start shipping this newer TPM. Thus, a migration from TPM 1.2 to TPM 2.0 will likely be seen in the next few years. To address this issue, we also provide an API that allows a smooth upgrade from TPM 1.2 to TPM 2.0 without having to redesign the communication protocol involving the dierent entities. The API has been implemented for both TPM 1.2 and TPM 2.0.",
keywords = "Trusted Computing, TPM, Migration, Certiable Migration Key, Secure Storage",
author = "Martin Hell and Linus Karlsson and Ben Smeets and Jelena Mirosavljevic",
year = "2014",
doi = "10.1007/978-3-319-27998-5_16",
language = "English",
isbn = "978-3-319-27997-8",
volume = "9473",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "243--258",
editor = "Moti Yung and Liehuang Zhu and Yanjiang Yang",
booktitle = "Trusted Systems/Lecture Notes in Computer Science",
address = "Germany",
note = "INTRUST 2014 ; Conference date: 16-12-2014 Through 17-12-2014",
}