2013
DOI: 10.1007/978-3-642-37682-5_23
|View full text |Cite
|
Sign up to set email alerts
|

Secure and Privacy-Aware Multiplexing of Hardware-Protected TPM Integrity Measurements among Virtual Machines

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…MyCloud reduces as much as possible the trusted computing base (e.g., putting the control of VMs out of its scope) and permits clients to configure their privacy protection, reducing at the same time the ability of the cloud provider of modifying privacy settings. Departing from vTPM, Velten and Stumpf [2013] provide a solution proving integrity of several different VMs using a single hardware TPM. The presented approach does not allow an attacker to tamper with the mapping between a VM and each integrity measurement, and stores the latter in a concealed manner to prevent information leakage by other tenants during remote attestation.…”
Section: Trusted Computingmentioning
confidence: 99%
“…MyCloud reduces as much as possible the trusted computing base (e.g., putting the control of VMs out of its scope) and permits clients to configure their privacy protection, reducing at the same time the ability of the cloud provider of modifying privacy settings. Departing from vTPM, Velten and Stumpf [2013] provide a solution proving integrity of several different VMs using a single hardware TPM. The presented approach does not allow an attacker to tamper with the mapping between a VM and each integrity measurement, and stores the latter in a concealed manner to prevent information leakage by other tenants during remote attestation.…”
Section: Trusted Computingmentioning
confidence: 99%