Development of m-TMS for trusted computing in mobile cloud

  • Authors:
  • Hyun-Woo Kim;Eun-Ha Song;Jun-Ho Kim;Sang Oh Park;Young-Sik Jeong

  • Affiliations:
  • Department of Computer Engineering, Wonkwang University, Iksan, South Korea;Department of Computer Engineering, Wonkwang University, Iksan, South Korea;Department of Computer Engineering, Wonkwang University, Iksan, South Korea;School of Computer Science and Engineering, Chung-Ang University, Seoul, South Korea;Department of Computer Engineering, Wonkwang University, Iksan, South Korea

  • Venue:
  • GPC'12 Proceedings of the 7th international conference on Advances in Grid and Pervasive Computing
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this rapidly changing IT society, computer system security is very crucial. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web; therefore it is exposed to a lot of risks and security of its spaces where data are stored is vulnerable. Accordingly, in order to reduce factors of threat to security, the TCG (Trusted Computing Group) proposed a highly reliable platform based on a semiconductor-chip, TPM(Trusted Platform Module). Therefore, this paper proposes a m -TMS (Mobile Trusted Monitoring System) that monitors trusted state of a computing environment on which TPM chip-based TPB (Trusted Platform Board) is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. m -TMS is provided to users so that system resources of CPU, RAM, and process, the objects of monitoring in a computer system, may be monitored. Moreover, converting and detouring of single entities like PC or target addresses, which are attack pattern methods that pose a threat to computer system security, are combined. Branch instruction trace function is monitored using a BiT (Branch Instruction Trace) Profiling tool through which processes attacked or those suspected of being attacked may be traced, enabling users to actively respond.