Research and Development of TPM Virtualization

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Combination of Cloud Computing and Trusted Computing is an important method to build a trusted cloud environment, and the most critical problem is the virtualization of TPM (Trusted Platform Module, TPM). But in view of the current research, TPM virtualization still not only does not meet the whole TCG specification, but also has a lot of security issues, and it is becoming the bottleneck of building a trusted cloud environment by combination of Cloud Computing and Trusted Computing. This paper introduces the basic concepts, types and basic requirements of TPM virtualization. The classification model of TPM virtualization is put forward by the I/O device virtualization technology. The main research work of the key technologies of TPM virtualization, such as architecture, key management, certification trust extension, migration and so on, are described in detail, moreover taking time as the clue, we can display a panoramic view of the evolution of related key technologies. Combined with the existing research results, the research direction and challenges of TPM virtualization under TCG architecture are discussed.

Cite

CITATION STYLE

APA

Tan, L., Xiao, H., & Wang, J. (2020). Research and Development of TPM Virtualization. In Communications in Computer and Information Science (Vol. 1149 CCIS, pp. 206–250). Springer. https://doi.org/10.1007/978-981-15-3418-8_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free