Integrating Flexible Support for Security Policies into the Linux Operating System
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Exploiting concurrency vulnerabilities in system call wrappers
WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies
Trusted computing building blocks for embedded linux-based ARM trustzone platforms
Proceedings of the 3rd ACM workshop on Scalable trusted computing
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
Implementation Aspects of Mobile and Embedded Trusted Computing
Trust '09 Proceedings of the 2nd International Conference on Trusted Computing
Communications of the ACM
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Towards customizable, application specific mobile trusted modules
Proceedings of the fifth ACM workshop on Scalable trusted computing
Anonymous client authentication for transport layer security
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Seamless integration of trusted computing into standard cryptographic frameworks
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Hi-index | 0.00 |
Embedded systems are gradually evolving into alternatives to desktop and server systems in terms of performance, energy- and cost efficiency. Moreover, with the improvement of their performance and storage capabilities, they are about to enter the domain of desktop systems and cloud computing. However, the question remains whether such systems can be used in cloud computing scenarios in a secure and energy efficient way or not and, if this is not the case, how do they have to be enhanced and which components are missing. In this paper, we present an approach to how cloud computing can be realized securely on embedded systems by means of embedded Trusted Computing. We provide a reference design of a micro-data-center and present an analysis covering the topics of performance, security as well as energy consumption. Moreover, we discuss our concept for a light-weight virtualization framework which is specifically tailored to the requirements of embedded systems.