Improvements in Data Storage Process in TPM for Integrity Management

  • Mariane M. S. Zeitouni UFCG
  • Marcela Tassyany Galdino Santos UFCG
  • Reinaldo Cezar De Morais Gomes UFCG

Abstract


Some electronic devices have native solutions to guarantee their integrity, one example is the TPM (Trusted Platform Module), a chip dedicated to security. In virtual machines, a vTPM (Virtual Trusted Platform Module) can be found, which, when anchored with the TPM, can take advantage of the security robustness that the TPM has. However, there is an obstacle to this strategy, and that is where the objective of this work arises. The vTPM, when generating multiple requests to the TPM, can generate an overload on the chip and, to solve this as well as multiple requests not necessarily coming from the vTPM, the work proposes the implementation of a request scheduler.

References

W. Arthur, D. Challener, and K. Goldman, A practical guide to TPM 2.0: Using the new trusted platform module in the new age of security. Springer Nature, 2015.

M. Zimmerman. (2018) Virtual trusted platform module for shielded vms: security in plaintext. Acessado em 17 de maio de 2024. [Online]. Available: [link]

M. Eckel and T. Riemann, “Userspace software integrity measurement,” in Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, pp. 1–11.

Trusted computing group. Acessado em 17 de maio de 2024. [Online]. Available: [link]

M. Tassyany, R. Sarmento, E. Falcão, R. Gomes, and A. Brito, “Um mecanismo de aprovisionamento de identidades para microsserviços baseado na integridade do ambiente de execução,” in Anais do XXXIX Simpósio Brasileiro de Redes de Computadores e Sistemas Distribuídos. SBC, 2021, pp. 714–727.

R. Perez, R. Sailer, L. van Doorn et al., “vtpm: virtualizing the trusted platform module,” in Proc. 15th Conf. on USENIX Security Symposium, 2006, pp. 305–320.

J. Schmitz, J. Loew, J. Elwell, D. Ponomarev, and N. Abu-Ghazaleh, “Tpm-sim: A framework for performance evaluation of trusted platform modules,” in Proceedings of the 48th Design Automation Conference, 2011, pp. 236–241.

Trusted virtual data center. Acessado em 17 de maio de 2024. [Online]. Available: [link]
Published
2024-09-16
ZEITOUNI, Mariane M. S.; SANTOS, Marcela Tassyany Galdino; GOMES, Reinaldo Cezar De Morais. Improvements in Data Storage Process in TPM for Integrity Management. In: WORKSHOP ON SCIENTIFIC INITIATION AND UNDERGRADUATE WORKS - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 24. , 2024, São José dos Campos/SP. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2024 . p. 270-278. DOI: https://doi.org/10.5753/sbseg_estendido.2024.243344.