Skip to main content

Utilizing TPM Functionalities on Remote Server

  • Conference paper
  • First Online:
Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 203))

Abstract

Trusted Platform Module (TPM) has become an essential functionality in the information security world today. However, there are legacy computers that do not have TPM onboard and would still want to use the TPM functionalities without having to replace the hardware. Also, TPMs are not available for virtual machines hence there is a need to provide integrity of the virtual machine platforms. This paper introduces a framework to provide a remote server with TPM capabilities for the legacy computer and also virtual machines to be able to utilize TPM functionalities. In this framework, there is also a need to provide fault tolerance mechanism to ensure reliability of the server and also scalability feature is incorporated to cater for growing number of users. The main component of the framework is the ‘vTPM Manager’ module which resides in the remote TPM server. This vTPM Manager handles the creation and deletion of virtual TPMs, providing fault tolerance mechanism and also scalability feature for the whole system. By using this framework, users who do not have a TPM residing in their device would be able to remotely access the TPM server to utilize the TPM functionalities with the assurance of a fault tolerance mechanism and the number of users is unlimited since it is scalable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Trusted Computing Group: http://trustedcomputinggroup.org

  2. TPM Main: Part 1 design principles. 1.2 revision 85 edition, (2005)

    Google Scholar 

  3. Berger, S., Caceres, R., Goldman, K.A., Perez, R., Sailer, R., Doorn, L.v.: vTPM: virtualizing the trusted platform module. In: 15th USENIX security symposium (2006)

    Google Scholar 

  4. Stumpf, F., Benz, M., Hermanowski. M., and Eckert, C.: Approach to a trustworthy system architecture using virtualization. ATC 2007, LNCS 4610, pp. 191–202, Springer (2007)

    Google Scholar 

  5. Wang, W., Zhang, Y., Lin, B., Wu, X.Y., Miao, K.: Secured and reliable VM migration in personal cloud, 2nd international conference on computer engineering and technology (ICCET), IEEE (2010)

    Google Scholar 

  6. Dai, W., Jin, H., Zou, D., Xu, S., Zhen, W. and Shi, L.; TEE: A virtual DRTM based execution environment for secure cloud-end computing. Proceeding CCS’10 proceedings of the 17th conference on computer and communications security, ISBN: 978-1-4503-0244-9, ACM (2010)

    Google Scholar 

  7. Shilin, Z., Mei, G.: Distributed multimedia content processing based on web service. Proceeding of international forum on computer science-technology and applications, ISBN: 978-0-7695-3930-0, IEEE (2009)

    Google Scholar 

  8. Morel, G., Pétin, J.F., Johnson, T.L.: Reliability, maintainability, and safety. Springer handbook of automation (2009)

    Google Scholar 

  9. Clarke, J., Dede, C.: Robust designs for scalability. AECT research symposium, June 22–25, Bloomington, Indiana (2006)

    Google Scholar 

  10. Norazah, A.A., Lucyantie, M.: Identity credential issuance with trusted computing, 2nd international conference on computing and informatics, ICOCI’09 (2009)

    Google Scholar 

  11. Lucyantie, M., Norazah, A.A., Habibah, H., Mohd Anuar, M.I.: Attestation with trusted configuration machine. Proceeding of international conference on computer applications and industrial electronics ICCAIE, ISBN: 9781457720574, IEEE (2011)

    Google Scholar 

  12. The virtualization API, http://libvirt.org/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Norazah Abd Aziz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Abd Aziz, N., Khalid, P.S. (2012). Utilizing TPM Functionalities on Remote Server. In: Yeo, SS., Pan, Y., Lee, Y., Chang, H. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 203. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-5699-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-5699-1_1

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-5698-4

  • Online ISBN: 978-94-007-5699-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics