Building a Secure Scheme for a Trusted Hardware Sharing Environment

作者: Di Lu , Jianfeng Ma , Cong Sun , Qixuan Wu , Zhaochang Sun

DOI: 10.1109/ACCESS.2017.2703124

关键词:

摘要: Trusted hardware sharing (THS) system can provide multiple trusted execution environments (TEE) via the (e.g., platform module virtualization) for stand-alone and isolation scenarios. However, function requests (TFRs) sent to are emitted by TEEs, which have be processed THS. Since different applications in TEEs security requirements, data TFRs need protected from being leaked or modified an unauthorized manner. To address this issue, we present a secure scheme THS systems based on information flow model that protects sensitive TFRs. Each TFR is assigned level according their owner, isolated with levels. We implement prototype conduct experiments both shared memory environments. The results indicate introduction of mechanisms lead more time consumption processing increase dimension degradation performance still acceptable mitigated real world, because intensive not as they experimental environment.

参考文章(13)
Wei Feng, Dengguo Feng, Ge Wei, Yu Qin, Qianying Zhang, Dexian Chang, TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications Trust and Trustworthy Computing. pp. 133- 141 ,(2013) , 10.1007/978-3-642-38908-5_10
Alec Wolman, Stefan Saroiu, Himanshu Raj, Chen Chen, cTPM: a cloud TPM for cross-device trusted applications networked systems design and implementation. pp. 187- 201 ,(2014) , 10.5555/2616448.2616466
Steven H. VanderLeest, DornerWorks Dagan White, MPSoC hypervisor: The safe & secure future of avionics ieee aiaa digital avionics systems conference. pp. 1- 25 ,(2015) , 10.1109/DASC.2015.7311612
Ravi S. Sandhu, Lattice-based enforcement of Chinese Walls Computers & Security. ,vol. 11, pp. 753- 763 ,(1992) , 10.1016/0167-4048(92)90131-A
Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu, POSTER: An E2E Trusted Cloud Infrastructure computer and communications security. pp. 1517- 1519 ,(2014) , 10.1145/2660267.2662383
Dorothy E. Denning, A lattice model of secure information flow Communications of the ACM. ,vol. 19, pp. 236- 243 ,(1976) , 10.1145/360051.360056
Daniel Muench, Michael Paulitsch, Andreas Herkersdorf, IOMPU: Spatial Separation for Hardware-Based I/O Virtualization for Mixed-Criticality Embedded Real-Time Systems Using Non-transparent Bridges high performance computing and communications. pp. 1037- 1044 ,(2015) , 10.1109/HPCC-CSS-ICESS.2015.221
Mary-Jane Sule, Maozhen Li, Gareth A Taylor, Simon Furber, Deploying trusted cloud computing for data intensive power system applications international universities power engineering conference. pp. 1- 5 ,(2015) , 10.1109/UPEC.2015.7339864
Paul J. Parkinson, Applying MILS to multicore avionics systems high performance embedded architectures and compilers. ,(2016) , 10.5281/ZENODO.47978