Title :
Trusted distributed log services
Author_Institution :
Dip. di Autom. e Inf., Politec. di Torino, Torino, Italy
Abstract :
Establishing trust is a key challenge in mobile applications or wherever interactions are volatile and a-priori trust cannot be reasonably assumed. Trustworthy log services could grant several benefits in this context. In the attempt to formalise this class of security services, we have uncovered that their safe design require specific trust assumptions and tamper-resistant hardware. These requirements are met by commodity cryptographic equipment, but at the cost of serious scalability limits in practical applications. Additional cryptographic tools can be exploited to overcome these limitations. In particular, we have compared several implementation options based on the TPM, a security chip installed on most PC-like devices. We have highlighted that TPM standard features actually allow implementing trusted log services but with serious scalability constraints. We have thus discussed some solutions to overcome these limitations by adding minimal new features to the TPM.
Keywords :
cryptography; data privacy; microprocessor chips; mobile computing; TPM security chip; commodity cryptographic equipment; mobile applications; scalability constraint; security services; trusted distributed log services; trusted platform module; Context-aware services; Costs; Cryptography; Data security; Event detection; Hardware; Privacy; Protection; Scalability; Technology management; Log services; Security and Privacy Protection; Trusted Computing;
Conference_Titel :
Wireless Conference (EW), 2010 European
Conference_Location :
Lucca
Print_ISBN :
978-1-4244-5999-5
DOI :
10.1109/EW.2010.5483494