You are here

Towards a Trust Envisioned Cyber Security

Journal Name:

Publication Year:

Abstract (2. Language): 
Ensuring trust in cyber space has become an important and indispensable security challenge. Questions about trust in the physical space can be answered based on the factors namely closeness, time, analyzing actions and body language. But in the cyber space these factors are not readily available correctly to ensure and verify trust. Trust can also be established via a third party. But can we know with absolute certainty that the entity with whom we are communicating is trustworthy or not? Cyber security is all about ensuring that software will behave in an expected manner and that it can prevent any threats that deter it from its expected operations. It not just deals with securing networks but rather focuses on ensuring the security of the devices connected to the networks. In this paper, we discuss the approaches used earlier for establishing trust, their limitations and focus on the need for hardware-based root of trust as software-only solutions are inadequate to ensure complete trust. We discuss an emerging technology in the field of trusted computing called the Trusted Platform Module that provides a hardware-based root of trust. We also discuss about its scope, various applications, and the future work being done on it.
540-546

REFERENCES

References: 

[1] Virgil D. Gligor, and Jeannette M. Wing, “Towards a Theory of Trust in Networks of Humans and Computers,” Carnegie
Mellon University Research Showcase, 2011.
[2] Nor Fatimah Bt Awang, “Trusted Computing-Opportunities & Risks,” Collaborative Computing: Networking, Applications
and Worksharing, IEEE, 2009.
[3] Trusted Computing Group, Incorporated, “TCG specification architecture overview,” 2007.
[4] A. Sadeghi, M. Selhorst, C. Stuble, C. Wachsmann, and M. Winandy, “TCG inside?: A note on TPM specification
compliance,” Proceedings of the first ACM workshop on Scalable trusted computing, ACM, pp. 4756, 2006.
[5] Hatoon Matbouli, and Qigang Gao, “An Overview on Web Security Threats and Impact to E-Commerce Success,”
International Conference on Information Technology and e-Services, IEEE, 2012.
[6] A. Esma, and S. David, “The ultimate invasion of privacy: Identity theft,” Ninth Annual International Conference on
Privacy, Security and Trust, IEEE, 2011.
[7] M. Tariq Banday, Jameel A. Quadri, and Nisar A. Shah, “Study of Botnets and Their Threats to Internet Security,”
Sprouts: Working Papers on Information Systems, 2009.
[8] Norman Schneidewind, “Metrics for Mitigating Cybersecurity Threats to Networks,” Internet computing, IEEE, pp. 6471,
2010.
[9] Junkai Gu, and Weiyong Ji, “A secure bootstrap based on trusted computing,” International Conference on New Trends
in Information and Service Science, IEEE, 2009.
[10] Bryan Parno, Jonathan M. McCune, and Adrian Perrig, Bootstrapping Trust in Modern Computers, ISBN 978-1-4614-
1459-9, Springer, 2011.
[11] Keith E. Mayes, and Konstantinos Markantonakis, Smart Cards, Tokens, Security and Applications, ISBN-13: 978-0-387-
72197-2, Springer Science+Business Media, LLC, 2008.
[12] Dries Schellekens, Brecht Wyseur, and Bart Preneel, “Remote Attestation on Legacy Operating Systems with Trusted
Platform Module,” Electronic Notes in Theoretical Computer Science 197, Elsevier, 2008.
[13] Sundeep Bajikar, “Trusted Platform Module (TPM) based Security on Notebook PCs White Paper,” Intel Corporation,
2002.
[14] Siani Pearson, “Trusted Computing Platforms, the Next Security Solution,” HP Laboratories, Hewlett-Packard Company,
2002.
[15] Asif Ali Wagan, Bilal Munir Mughal, and Halabi Hasbullah, “VANET Security Framework for Trusted Grouping using TPM
Hardware,” Second International Conference on Communication Software and Networks, IEEE, 2010.
[16] Russell A. Fink, Alan T. Sherman, and Richard Carback, “TPM Meets DRE: Reducing the Trust Base for Electronic Voting
Using Trusted Platform Modules,” IEEE Transactions on Information Forensics and Security, IEEE, 2009.
[17] Holger Kinkelin, Ralph Holz, Heiko Niedermayer, Simon Mittelberger, and Georg Carle, “On Using TPM for Secure
Identities in Future Home Networks,” Future Internet, 2011.

Thank you for copying data from http://www.arastirmax.com