Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Key Protection for Private Computing on Public Platforms
Thomas H Morris, V.S.S. Nair
Pages - 371 - 383 | Revised - 26-11-2009 | Published - 26-12-2009
MORE INFORMATION
KEYWORDS
application isolation, encryption key protection, private computing
ABSTRACT
Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and
private execution of applications on remote, potentially hostile, public platforms. PCPP uses a host
assessment to validate a host’s hardware and software configuration and then uses applied encryption
techniques embedded in the operating system to isolate the protected application allowing its executable
code, context, and data to remain unaltered, unmonitored, and unrecorded before, during, and after
execution. PCPP must secure its encryption keys to ensure that the application isolation is robust and
reliable. In this paper we offer a detailed description of the PCPP Key Protection scheme including its
architecture, PCPP Key Protection security analysis, and a discussion of the performance overhead
associated with using PCPP Key Protection.
1 | Nair, S. Privacy and Security Automation for Cloud Computing. |
Anderson, D. P., Cobb, J., Korpela, E., Lebofsky, M., and Werthimer, D. 2002. SETI@home: an experiment in public-resource computing. Communications of the ACM 45, 11 (Nov. 2002), 56-61. | |
Barak, B. and Halevi, S. 2005. A model and architecture for pseudo-random generation with applications to /dev/random. In Proceedings of the 12th ACM Conference on Computer and Communications Security (Alexandria, VA, USA, November 07 - 11, 2005). CCS '05. ACM, New York, NY, 203-212. | |
Chow, S. Eisen, P. Johnson, H. Van Oorschot, P. A White-Box DES Implementation for DRM Applications. Digital Rights Management. Springer-Verlag LNCS 2696, pp 1-15, 2002. | |
D. Eastlake and P. Jones. RFC 3174. US Secure Hash Algorithm 1 (SHA1). http://www.faqs.org/rfcs/rfc3174.html | |
Felten, E.W., Understanding Trusted Computing: Will its benefits outweigh its drawbacks?, IEEE Security and Privacy Magazine, Volume 1, Issue 3, May-June, 2003 | |
Foster, I. Globus Toolkit Version 4: Software for Service-Oriented Systems. IFIP International Conference on Network and Parallel Computing, Springer-Verlag LNCS 3779, pp 2-13, 2005. | |
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104. HMAC: Keyed-Hashing for Message Authentication. http://www.faqs.org/rfcs/rfc2104.html | |
Kumar A., Chopdekar S., Getting Started with the Linux key retention service, http://www.ibm.com/developerworks/linux/library/l-key-retention.html | |
Marchesini, J., Smith, S., Wild, O., MacDonald, R., Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear, Dartmouth Computer Science Technical Report TR2003-476, ftp://ftp.cs.dartmouth.edu/TR/TR2003-476.pdf | |
Morris, T. Nair, V.S.S. Private Computing on Public Platforms: Portable Application Security. Submitted to Wiley InterScience Journal of Wireless Communications and Mobile Computing. (to appear) | |
Perkins, G., Bhattacharya, P., An Encryption Scheme for Limited k-time Access to Digital Media, IEEE Transactions on Consumer Electronics, Volume: 49, Issue: 1, Feb. 2003 | |
R. Rivest. RFC 1321. The MD5 Message-Digest Algorithm. http://www.faqs.org/rfcs/rfc1321.html | |
The Linux Kernel Archives, http://www.kernel.org/ | |
Trusted Computing Group Fact Sheet, https://www.trustedcomputinggroup.org/about/FACTSHEET_revised_may_07.pdf | |
Y. Hasan, “Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely Keyed Authenticated Encryption,” IEEE International Symposium on Signal Processing and Information Technology, pp.74–79, 2007. | |
Dr. Thomas H Morris
Mississippi State University - United States of America
morris@ece.msstate.edu
Dr. V.S.S. Nair
Southern Methodist University - United States of America
|
|
|
|
View all special issues >> | |
|
|