Recent trends in applying TPM to cloud computing

dc.contributor.authorShohreh Hosseinzadeh
dc.contributor.authorBernardo Sequeiros
dc.contributor.authorPedro R. M. Inácio
dc.contributor.authorVille Leppänen
dc.contributor.organizationfi=ohjelmistotekniikka|en=Software Engineering|
dc.contributor.organization-code1.2.246.10.2458963.20.71310837563
dc.contributor.organization-code2606804
dc.converis.publication-id44075829
dc.converis.urlhttps://research.utu.fi/converis/portal/Publication/44075829
dc.date.accessioned2025-08-28T00:20:33Z
dc.date.available2025-08-28T00:20:33Z
dc.description.abstract<p>Trusted platform modules (TPM) have become important safe‐guards against variety of software‐based attacks. By providing a limited set of cryptographic services through a well‐defined interface, separated from the software itself, TPM can serve as a root of trust and as a building block for higher‐level security measures. This article surveys the literature for applications of TPM in the cloud‐computing environment, with publication dates comprised between 2013 and 2018. It identifies the current trends and objectives of this technology in the cloud, and the type of threats that it mitigates. Toward the end, the main research gaps are pinpointed and discussed. Since integrity measurement is one of the main usages of TPM, special attention is paid to the assessment of run time phases and software layers it is applied to.</p>
dc.identifier.eissn2475-6725
dc.identifier.jour-issn2475-6725
dc.identifier.olddbid205546
dc.identifier.oldhandle10024/188573
dc.identifier.urihttps://www.utupub.fi/handle/11111/55294
dc.identifier.urlhttps://onlinelibrary.wiley.com/doi/abs/10.1002/spy2.93
dc.identifier.urnURN:NBN:fi-fe2021042822031
dc.language.isoen
dc.okm.affiliatedauthorHosseinzadeh, Shohreh
dc.okm.affiliatedauthorLeppänen, Ville
dc.okm.discipline113 Computer and information sciencesen_GB
dc.okm.discipline113 Tietojenkäsittely ja informaatiotieteetfi_FI
dc.okm.internationalcopublicationinternational co-publication
dc.okm.internationalityInternational publication
dc.okm.typeA1 ScientificArticle
dc.publisherWiley
dc.publisher.countryUnited Kingdomen_GB
dc.publisher.countryBritanniafi_FI
dc.publisher.country-codeGB
dc.relation.articlenumbere93
dc.relation.doi10.1002/spy2.93
dc.relation.ispartofjournalSecurity and Privacy
dc.relation.issue1
dc.relation.volume3
dc.source.identifierhttps://www.utupub.fi/handle/10024/188573
dc.titleRecent trends in applying TPM to cloud computing
dc.year.issued2020

Tiedostot

Näytetään 1 - 1 / 1
Ladataan...
Name:
Hosseinzadeh_et_al-2020-Security_and_Privacy.pdf
Size:
1.6 MB
Format:
Adobe Portable Document Format
Description:
Publisher's PDF