Using TPM Secure Storage in Trusted High Availability Systems

Martin Hell, Linus Karlsson, Ben Smeets, Jelena Mirosavljevic

Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceedingPeer review

476 Nedladdningar (Pure)

Sammanfattning

We consider the problem of providing trusted computing
functionality in high availability systems. We consider the case where
data is required to be encrypted with a TPM protected key. For redundancy,
and to facilitate high availability, the same TPM key is stored in
multiple computational units, each one ready to take over if the main
unit breaks down. This requires the TPM key to be migratable. We show
how such systems can be realized using the secure storage of the TPM.
Hundreds of millions TPM 1.2 chips have been shipped but with the recent
introduction of TPM 2.0, more manufacturers are expected to start
shipping this newer TPM. Thus, a migration from TPM 1.2 to TPM 2.0
will likely be seen in the next few years. To address this issue, we also
provide an API that allows a smooth upgrade from TPM 1.2 to TPM
2.0 without having to redesign the communication protocol involving the
dierent entities. The API has been implemented for both TPM 1.2 and
TPM 2.0.
Originalspråkengelska
Titel på värdpublikationTrusted Systems/Lecture Notes in Computer Science
RedaktörerMoti Yung, Liehuang Zhu, Yanjiang Yang
FörlagSpringer
Sidor243-258
Volym9473
ISBN (elektroniskt)978-3-319-27998-5
ISBN (tryckt)978-3-319-27997-8
DOI
StatusPublished - 2014
EvenemangINTRUST 2014 - Beijing, Kina
Varaktighet: 2014 dec. 162014 dec. 17

Publikationsserier

NamnLecture Notes in Computer Science
FörlagSpringer
Volym9473
ISSN (tryckt)0302-9743

Konferens

KonferensINTRUST 2014
Land/TerritoriumKina
OrtBeijing
Period2014/12/162014/12/17

Ämnesklassifikation (UKÄ)

  • Elektroteknik och elektronik

Fingeravtryck

Utforska forskningsämnen för ”Using TPM Secure Storage in Trusted High Availability Systems”. Tillsammans bildar de ett unikt fingeravtryck.

Citera det här