Home   >   CSC-OpenAccess Library   >    Manuscript Information
Key Protection for Private Computing on Public Platforms
Thomas H Morris, V.S.S. Nair
Pages - 371 - 383     |    Revised - 26-11-2009     |    Published - 26-12-2009
Volume - 3   Issue - 5    |    Publication Date - November 2009  Table of Contents
MORE INFORMATION
KEYWORDS
application isolation, encryption key protection, private computing
ABSTRACT
Private Computing on Public Platforms (PCPP) is a new technology designed to enable secure and private execution of applications on remote, potentially hostile, public platforms. PCPP uses a host assessment to validate a host’s hardware and software configuration and then uses applied encryption techniques embedded in the operating system to isolate the protected application allowing its executable code, context, and data to remain unaltered, unmonitored, and unrecorded before, during, and after execution. PCPP must secure its encryption keys to ensure that the application isolation is robust and reliable. In this paper we offer a detailed description of the PCPP Key Protection scheme including its architecture, PCPP Key Protection security analysis, and a discussion of the performance overhead associated with using PCPP Key Protection.
CITED BY (1)  
1 Nair, S. Privacy and Security Automation for Cloud Computing.
1 Google Scholar 
2 Academic Journals Database 
3 ScientificCommons 
4 Academic Index 
5 CiteSeerX 
6 refSeek 
7 iSEEK 
8 ResearchGATE 
9 Libsearch 
10 Bielefeld Academic Search Engine (BASE) 
11 Scribd 
12 WorldCat 
13 SlideShare 
14 PDFCAST 
15 PdfSR 
Anderson, D. P., Cobb, J., Korpela, E., Lebofsky, M., and Werthimer, D. 2002. SETI@home: an experiment in public-resource computing. Communications of the ACM 45, 11 (Nov. 2002), 56-61.
Barak, B. and Halevi, S. 2005. A model and architecture for pseudo-random generation with applications to /dev/random. In Proceedings of the 12th ACM Conference on Computer and Communications Security (Alexandria, VA, USA, November 07 - 11, 2005). CCS '05. ACM, New York, NY, 203-212.
Chow, S. Eisen, P. Johnson, H. Van Oorschot, P. A White-Box DES Implementation for DRM Applications. Digital Rights Management. Springer-Verlag LNCS 2696, pp 1-15, 2002.
D. Eastlake and P. Jones. RFC 3174. US Secure Hash Algorithm 1 (SHA1). http://www.faqs.org/rfcs/rfc3174.html
Felten, E.W., Understanding Trusted Computing: Will its benefits outweigh its drawbacks?, IEEE Security and Privacy Magazine, Volume 1, Issue 3, May-June, 2003
Foster, I. Globus Toolkit Version 4: Software for Service-Oriented Systems. IFIP International Conference on Network and Parallel Computing, Springer-Verlag LNCS 3779, pp 2-13, 2005.
H. Krawczyk, M. Bellare, and R. Canetti. RFC 2104. HMAC: Keyed-Hashing for Message Authentication. http://www.faqs.org/rfcs/rfc2104.html
Kumar A., Chopdekar S., Getting Started with the Linux key retention service, http://www.ibm.com/developerworks/linux/library/l-key-retention.html
Marchesini, J., Smith, S., Wild, O., MacDonald, R., Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear, Dartmouth Computer Science Technical Report TR2003-476, ftp://ftp.cs.dartmouth.edu/TR/TR2003-476.pdf
Morris, T. Nair, V.S.S. Private Computing on Public Platforms: Portable Application Security. Submitted to Wiley InterScience Journal of Wireless Communications and Mobile Computing. (to appear)
Perkins, G., Bhattacharya, P., An Encryption Scheme for Limited k-time Access to Digital Media, IEEE Transactions on Consumer Electronics, Volume: 49, Issue: 1, Feb. 2003
R. Rivest. RFC 1321. The MD5 Message-Digest Algorithm. http://www.faqs.org/rfcs/rfc1321.html
The Linux Kernel Archives, http://www.kernel.org/
Trusted Computing Group Fact Sheet, https://www.trustedcomputinggroup.org/about/FACTSHEET_revised_may_07.pdf
Y. Hasan, “Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely Keyed Authenticated Encryption,” IEEE International Symposium on Signal Processing and Information Technology, pp.74–79, 2007.
Dr. Thomas H Morris
Mississippi State University - United States of America
morris@ece.msstate.edu
Dr. V.S.S. Nair
Southern Methodist University - United States of America