“…Several systems have been built using trusted computing concepts such as the Next Generation Secure Computing Base by Microsoft [12], Trusted Execution Technology by Intel [13], secure co-processors by IBM [14], [15], and others [16]- [19]. In addition, researchers have developed systems that utilize the TPM for anonymous attestation [20], authentication [21], [22], device attestation [23], [24], digital rights management [25], digital signature [26], [27], distributed computing [28], [29], drive encryption [30], evoting [31], grid security [32], [33], identity management [34], [35], mobile agents [36], [37], on-line payment [38], [39], on-line storage [40], peer-to-peer networks [41], [42], policy enforcement [43], [44], and virtualization [45], [46]. These studies, however, do not consider a security service that will hide information from the rest of the system including the system administrator as in blind processing.…”