Architectural support for protecting user privacy on trusted processors

  • Authors:
  • Youtao Zhang;Jun Yang;Yongjing Lin;Lan Gao

  • Affiliations:
  • The University of Texas at Dallas, Richardson, TX;The University of California at Riverside, Riverside, CA;The University of Texas at Dallas, Richardson, TX;The University of California at Riverside, Riverside, CA

  • Venue:
  • ACM SIGARCH Computer Architecture News - Special issue: Workshop on architectural support for security and anti-virus (WASSA)
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Recently proposed trusted processor model is a promising model for building secure applications. While effective designs have been proposed for protecting data confidentiality and data integrity in such environments, an important security criterion -- user privacy is usually neglected in current designs. Due to the increasing concern of privacy protection in the Internet era, such deficiency can hinder the adoption of the new model.In this paper, we identify the threat model to user privacy and propose a new scheme for user privacy protection. In addition to providing the same ability in protecting data confidentiality and data integrity, the new scheme effectively protects user privacy and only introduces very low overhead.