Sensitive Data Protection through Encryption with TPM

  • Rafael A. Menezes UECE
  • Ramon S. Araújo UECE
  • Lyedson S. Rodrigues UECE
  • Neyrobson L. Vasconselos CPDI
  • Rafael L. Gomes UECE

Abstract


The growing number of cyber threats and the increasing complexity of attacks have made the protection of sensitive data increasingly critical. This work presents a solution that integrates the Trusted Platform Module (TPM) with symmetric (AES-CBC) and asymmetric (RSA) encryption to ensure secure data storage, using TPM as the root of trust for secure cryptographic key management. A modular architecture was developed, including components for authentication based on the TPM’s unique identifier, data encryption and decryption, and secure key management. Experiments were conducted on different hardwares to analyze the impact of TPM on the performance of cryptographic operations, and the results showed the effectiveness of the solution.

References

Ali, M. and Kumar, S. (2024). Evaluation of various cryptographic techniques based on file size on cloud storage security. International Journal of Advanced Computer Science.

Costa, M. A., Costa, Y. M., Almeida, Y. O., Cardoso, F. J., and Gomes, R. L. (2024). Connection management using automated firewall based on threat intelligence. In Proceedings of the 2024 Latin America Networking Conference, LANC ’24, page 32–37, New York, NY, USA. Association for Computing Machinery.

da Silva, M. d. V. D., Rocha, A., Gomes, R. L., and Nogueira, M. (2021). Lightweight data compression for low energy consumption in industrial internet of things. In 2021 IEEE 18th Annual Consumer Communications Networking Conference (CCNC), pages 1–2.

Gomes, R. L., Júnior, J. J., Abelém, A. G., and Júnior, W. M. (2009). Qoe and qos support on wireless mesh networks. In Proceedings of the XV Brazilian Symposium on Multimedia and the Web, WebMedia ’09, New York, NY, USA. Association for Computing Machinery.

Gomes, R. L. and Madeira, E. R. M. (2012). A traffic classification agent for virtual networks based on qos classes. IEEE Latin America Transactions, 10(3):1734–1741.

Gomes, R. L., Moreira, W. A., Ferreira, J. J. H., and Abelém, A. J. G. (2010). Providing qoe and qos in wireless mesh networks through dynamic choice of routing metrics. IEEE Latin America Transactions, 8(4):454–462.

Hosseinzadeh, S., Sequeiros, B., Inácio, P. R. M., and Leppänen, V. (2020). Recent trends in applying tpm to cloud computing. SECURITY AND PRIVACY, 3(1):e93.

Jarkas, O., Ko, R., Dong, N., and Mahmud, R. (2025). A container security survey: Exploits, attacks, and defenses. ACM Comput. Surv. Just Accepted.

Jiang, Y., Wang, S., Figueiredo, R., and Jin, Y. (2023). Warm-boot attack on modern drams. In 2023 Design, Automation & Test in Europe Conference & Exhibition (DATE), pages 1–2. IEEE.

Patel, R. and Sharma, N. (2025). Evaluating the impact of aes-256 encryption on network performance. International Journal of Scientific Research in Multidisciplinary Techniques, 2(1):45–50.

Pimenta, I., Silva, D., Moura, E., Silveira, M., and Gomes, R. L. (2024). Impact of data anonymization in machine learning models. In Proceedings of the 13th Latin-American Symposium on Dependable and Secure Computing, LADC ’24, page 188–191, New York, NY, USA. Association for Computing Machinery.

Silveira, M., Santos, D., Souza, M., Silva, D., Mesquita, M., Neto, J., and Gome, R. L. (2023). An anonymization service for privacy in data mining. In Proceedings of the 12th Latin-American Symposium on Dependable and Secure Computing, LADC ’23, page 214–219, New York, NY, USA. Association for Computing Machinery.

Singh, A. and Mehra, K. (2023). Performance evaluation of cryptographic file system algorithms. Journal of Computer Science and Information Technology, 11(1):1–10.

Turriziani, D. (2023). Protection of private keys with tpm 2.0. Master’s thesis, Politecnico di Torino.
Published
2025-09-01
MENEZES, Rafael A.; ARAÚJO, Ramon S.; RODRIGUES, Lyedson S.; VASCONSELOS, Neyrobson L.; GOMES, Rafael L.. Sensitive Data Protection through Encryption with TPM. In: INDUSTRY TRACK - BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 25. , 2025, Foz do Iguaçu/PR. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2025 . p. 456-462. DOI: https://doi.org/10.5753/sbseg_estendido.2025.11785.

Most read articles by the same author(s)

1 2 3 > >>