Research Article Open Access

A USER PROTECTION MODEL FOR THE TRUSTED COMPUTING ENVIRONMENT

Marwan Ibrahim Alshar’e1, Rossilawati Sulaiman1, Mohd Rosmadi Mukhtar1 and Abdullah Mohd Zin1
  • 1 National University of Malaysia, Malaysia

Abstract

Information security presents a huge challenge for both individuals and organizations. The Trusted Computing Group (TCG) has introduced the Trusted Platform Module (TPM) as a solution to end-users to ensure their privacy and confidentiality. TPM has the role of being the root of trust for systems and users by providing protected storage that is accessible only within TPM and thus, protects computers against unwanted access. TPM is designed to prevent software attacks with minimal consideration being given toward physical attacks. Therefore, TPM focus on PIN password identification to control the physical presence of a user. The PIN Password method is not the ideal user verification method. Evil Maid is one of the attacking methods where a piece of code can be loaded and hidden in the boot loader before loading TPM. The code will then collects confidential information at the next boot and store it or send it to attackers via the network. In order to solve this problem, a number of solutions have been proposed. However, most of these solutions does not provide sufficient level of protection to TPM. In this study we introduce the TPM User Authentication Model (TPM-UAM) that could assist in protecting TPM against physical attack and thus increase the security of the computer system. The proposed model has been evaluated through a focus group discussion consisting of a number of experts. The expert panel has confirmed that the proposed model is sufficient to provide expected level of protection to the TPM and to assist in preventing physical attack against TPM.

Journal of Computer Science
Volume 10 No. 9, 2014, 1692-1702

DOI: https://doi.org/10.3844/jcssp.2014.1692.1702

Submitted On: 11 February 2014 Published On: 15 April 2014

How to Cite: Alshar’e, M. I., Sulaiman, R., Mukhtar, M. R. & Zin, A. M. (2014). A USER PROTECTION MODEL FOR THE TRUSTED COMPUTING ENVIRONMENT. Journal of Computer Science, 10(9), 1692-1702. https://doi.org/10.3844/jcssp.2014.1692.1702

  • 3,716 Views
  • 2,665 Downloads
  • 2 Citations

Download

Keywords

  • TPM
  • Biometrics
  • Authentication
  • Security
  • Privacy
  • Virtualization
  • Xen