Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(257.28KB)
This is an Open Access publication published under CSC-OpenAccess Policy.

PUBLICATIONS BY COUNTRIES

Top researchers from over 74 countries worldwide have trusted us because of quality publications.

United States of America
United Kingdom
Canada
Australia
Malaysia
China
Japan
Saudi Arabia
Egypt
India
Key Protection for Private Computing on Public Platforms
Thomas H Morris, V.S.S. Nair
Pages - 371 - 383     |    Revised - 26-11-2009     |    Published - 26-12-2009
Volume - 3   Issue - 5    |    Publication Date - November 2009  Table of Contents
MORE INFORMATION
KEYWORDS
application isolation, encryption key protection, private computing
ABSTRACT
Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platforms. PCPP uses a host assessment to validate a host’s hardware and software configuration and then uses applied encryption techniques embedded in the operating system to isolate the protected application allowing its executable code, context, and data to remain unaltered, unmonitored, and unrecorded before, during, and after execution. PCPP must secure its encryption keys to ensure that the application isolation is robust and reliable. In this paper we offer a detailed description of the PCPP Key Protection scheme including its architecture, PCPP Key Protection security analysis, and a discussion of the performance overhead associated with using PCPP Key Protection.
CITED BY (1)  
1 Nair, S. Privacy and Security Automation for Cloud Computing.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 ResearchGATE 
9 Libsearch 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
14 PDFCAST 
15 PdfSR 
1 Marchesini, J., Smith, S., Wild, O., MacDonald, R., Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear, Dartmouth Computer Science Technical Report TR2003-476, ftp://ftp.cs.dartmouth.edu/TR/TR2003-476.pdf
2 Trusted Computing Group Fact Sheet, https://www.trustedcomputinggroup.org/about/FACTSHEET_revised_may_07.pdf
3 Felten, E.W., Understanding Trusted Computing: Will its benefits outweigh its drawbacks?, IEEE Security and Privacy Magazine, Volume 1, Issue 3, May-June, 2003
4 Morris, T. Nair, V.S.S. Private Computing on Public Platforms: Portable Application Security. Submitted to Wiley InterScience Journal of Wireless Communications and Mobile Computing. (to appear)
5 Kumar A., Chopdekar S., Getting Started with the Linux key retention service, http://www.ibm.com/developerworks/linux/library/l-key-retention.html
6 Anderson, D. P., Cobb, J., Korpela, E., Lebofsky, M., and Werthimer, D. 2002. SETI@home: an experiment in public-resource computing. Communications of the ACM 45, 11 (Nov. 2002), 56-61.
7 Foster, I. Globus Toolkit Version 4: Software for Service-Oriented Systems. IFIP International Conference on Network and Parallel Computing, Springer-Verlag LNCS 3779, pp 2-13, 2005.
8 Perkins, G., Bhattacharya, P., An Encryption Scheme for Limited k-time Access to Digital Media, IEEE Transactions on Consumer Electronics, Volume: 49, Issue: 1, Feb. 2003
9 The Linux Kernel Archives, http://www.kernel.org/
10 Barak, B. and Halevi, S. 2005. A model and architecture for pseudo-random generation with applications to /dev/random. In Proceedings of the 12th ACM Conference on Computer and Communications Security (Alexandria, VA, USA, November 07 - 11, 2005). CCS '05. ACM, New York, NY, 203-212.
11 D. Eastlake and P. Jones. RFC 3174. US Secure Hash Algorithm 1 (SHA1). http://www.faqs.org/rfcs/rfc3174.html
12 R. Rivest. RFC 1321. The MD5 Message-Digest Algorithm. http://www.faqs.org/rfcs/rfc1321.html
13 H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104. HMAC: Keyed-Hashing for Message Authentication. http://www.faqs.org/rfcs/rfc2104.html
14 Chow, S. Eisen, P. Johnson, H. Van Oorschot, P. A White-Box DES Implementation for DRM Applications. Digital Rights Management. Springer-Verlag LNCS 2696, pp 1-15, 2002.
15 Y. Hasan, “Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely Keyed Authenticated Encryption,” IEEE International Symposium on Signal Processing and Information Technology, pp.74–79, 2007.
Dr. Thomas H Morris
Mississippi State University - United States of America
morris@ece.msstate.edu
Dr. V.S.S. Nair
Southern Methodist University - United States of America