Proceedings of the 9th International Conference on Utility and Cloud Computing 2016
DOI: 10.1145/2996890.3009903
|View full text |Cite
|
Sign up to set email alerts
|

Security in container-based virtualization through vTPM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
2

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(20 citation statements)
references
References 15 publications
0
16
0
2
Order By: Relevance
“…With the advent of cloud computing and virtualization, researchers started to look for alternatives to hardware TPMs in order to be more suitable for the hypervisor. This is because the hypervisor needs to make the TPM available, at the same time, to a plethora of VMs [64]. Software TPMs, also known as Virtual TPMs (vTPMs) were created to match these needs [64], [65].…”
Section: ) Virtual Trusted Platform Modules (Vtpm)mentioning
confidence: 99%
“…With the advent of cloud computing and virtualization, researchers started to look for alternatives to hardware TPMs in order to be more suitable for the hypervisor. This is because the hypervisor needs to make the TPM available, at the same time, to a plethora of VMs [64]. Software TPMs, also known as Virtual TPMs (vTPMs) were created to match these needs [64], [65].…”
Section: ) Virtual Trusted Platform Modules (Vtpm)mentioning
confidence: 99%
“…Trustable containers can be realised in a number of ways -e.g. using Virtual Trusted Platform Modules (vTPM) [25] and Intel Software Guard Extensions (SGX) [26] that protect containers from an untrusted host. These approaches make use of trusted hardware to protect containers from side channel attacks initiated by the hosting platform.…”
Section: Definitionmentioning
confidence: 99%
“…This chain of trust then extends to bootloaders, the OS kernel, and the OS components to enable cryptographic verification of boot mechanisms, system images, container runtimes, and container images. The technical solutions for implementing a trusted platform module (TPM) for a containerized host are outlined in [7]. Two such approaches are discussed in this document as well as the security assurance required for each solution.…”
Section: Hardware-based Security Solutions For Containersmentioning
confidence: 99%
“…In an architectural approach suggested in [7], a software-based module called vTPM (virtual TPM) is placed into the OS kernel. To make this module available to several containers, it needs to be virtualized.…”
Section: Vtpm In the Host Os Kernel -Security Assurance Requirementsmentioning
confidence: 99%
See 1 more Smart Citation