Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals` computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

[1]  Stefan Berger,et al.  Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[2]  Jong Hyuk Park,et al.  Visual Trustworthy Monitoring System (v-TMS) for Behavior of Trusted Computing , 2010 .

[3]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[4]  Tal Garfinkel,et al.  Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.

[5]  Renato J. O. Figueiredo,et al.  Guest Editors' Introduction: Resource Virtualization Renaissance , 2005, Computer.

[6]  Robert P. Goldberg,et al.  Survey of virtual machine research , 1974, Computer.

[7]  T. Alves,et al.  TrustZone : Integrated Hardware and Software Security , 2004 .

[8]  Scott A. Rotondo Trusted Computing Group , 2011, Encyclopedia of Cryptography and Security.

[9]  Gyungho Lee,et al.  Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace , 2010, J. Information Security.

[10]  G. Edward Suh,et al.  Design and implementation of the AEGIS single-chip secure processor using physical random functions , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).

[11]  Rajkumar Buyya,et al.  Introduction to Cloud Computing , 2011, CloudCom 2011.

[12]  Frederic T. Chong,et al.  Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).

[13]  Omkhar Arasaratnam,et al.  Introduction to Cloud Computing , 2011 .

[14]  Kjell Jørgen Hole,et al.  Securing Wi-Fi Networks , 2005, Computer.