Infrastructure for Trusted Environment: In Search of a Solution

Millions of PCs are currently sold equipped with a Trusted Platform Module, TPM, serving as a root of trust on the platform. Trusted Computing as an area of security has acquired significant visibility, and many new products and a growing number of research projects in areas ranging from virtualization to network security are based on Trusted Computing technologies and vision. In order to fully realize the vision of the Trusted Computing community, dedicated or compatible trust infrastructure for verification and attestation is required. Similar to other trust-enabling technologies, Trusted Computing needs an infrastructure that can verify the claim that a device is genuine and can be trusted to take part in a transaction, in which it is involved. Such an infrastructure will enable an environment where individuals can use the technology for protected transactions and potentially employ less risky authentication methods. This paper explores the role of infrastructure in Trusted Computing, starting with the discussion of the infrastructure’s importance and issues in trust establishment, followed by the description of the basics of Trusted Computing functionality requiring infrastructure support. We use examples of other trust enabling infrastructures, such as general-purpose PKI and infrastructure for Identity Federation to highlight common approaches. Finally, we touch upon economics of trust and intermediation, in order to define potential models for building enabling infrastructure for Trusted Computing.. While the paper doesn’t propose concrete solutions for the infrastructure problem in Trusted Computing, some possible avenues of building the necessary framework are outlined.

[1]  Ali A. Ghorbani,et al.  Value-Centric Trust Model with Improved Familiarity Measurement , 2005, IJCAI.

[2]  Stefan Berger,et al.  vTPM: Virtualizing the Trusted Platform Module , 2006, USENIX Security Symposium.

[3]  Rolf Oppliger,et al.  Why have public key infrastructures failed so far? , 2005, Internet Res..

[4]  E. Chang,et al.  Trust and Reputation for Service-Oriented Environments: Technologies For Building Business Intelligence And Consumer Confidence , 2006 .

[5]  Pekka Nikander,et al.  Storing and Retrieving Internet Certificates , 1998 .

[6]  Scott Flinn,et al.  User Perceptions of Privacy and Security on the Web , 2005, PST.

[7]  Peter Gutmann,et al.  Plug-and-Play PKI: A PKI Your Mother Can Use , 2003, USENIX Security Symposium.

[8]  Ross Gagliano Review of "Trust and reputation for service-oriented environments: Technologies for building business intelligence and consumer confidence" by Elizabeth Chang, Tharam Dillon, and Farookh Hussain, Wiley, 2006 , 2006 .

[9]  Andrew Whinston,et al.  The Economics Of Electronic Commerce , 1997 .

[10]  Bernhard Jansen,et al.  Architecting Dependable and Secure Systems Using Virtualization , 2007, WADS.

[11]  W. Jevons Money and the Mechanism of Exchange , 2001 .

[12]  Andrew B. Whinston,et al.  Knowledge sharing, quality, and intermediation , 1999, WACC.

[13]  William A. Wulf,et al.  Towards a scalable PKI for electronic commerce systems , 1999, Proceedings of International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems. (Cat. No.PR00334).

[14]  Javier López,et al.  Trust, Privacy and Security in E-Business: Requirements and Solutions , 2005, Panhellenic Conference on Informatics.

[15]  Stephen D. Williamson Recent developments in modeling financial intermediation , 1987 .

[16]  Brian S. Butler,et al.  Intermediaries and Cybermediaries: A Continuing Role for Mediating Players in the Electronic Marketplace , 1995, J. Comput. Mediat. Commun..

[17]  Batya Friedman,et al.  Trust online , 2000, CACM.