Trusted Computing and Secure Virtualization in Cloud Computing
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing...
-
Upload
charlotte-mcdonald -
Category
Documents
-
view
220 -
download
0
Transcript of 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing...
![Page 1: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/1.jpg)
1
NEW GENERATION SECURE COMPUTING BASE
![Page 2: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/2.jpg)
2
INTRODUCTION
Next Generation Secure Computing Base,formerly known as Palladium.
The aim for palladium is to increase the security and privacy of computer user.
Palladium refers to as a security chip
![Page 3: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/3.jpg)
3
INTRODUCTION (CONT………..)
Internet security is also provided by palladium such as protecting data from virus and hacking of data.
Palladium gives individual & groups of users greater data security ,personal privacy & system integrity.
![Page 4: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/4.jpg)
4
Solution :Palladium
![Page 5: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/5.jpg)
5
The fundamental benefit of Palladium fall into three chief categories;Greater system integrity, superior personal privacy & enhanced data security System integrity: Verification of hardware/software component, to what they are and what sealed data they can access.
![Page 6: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/6.jpg)
6
Enhanced data security:
Authenticate machine identify
keys are stored sealed storage
Protect personal privacy:
Prevent unauthorized access of personal data from the network
![Page 7: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/7.jpg)
7
CORE PRINCIPLES OF PALLADIUM
Palladium comprises two key component :
Hardware Software
![Page 8: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/8.jpg)
8
HARDWARE COMPONENTS
TRUSTED SPACE
SEALED STORAGE
ATTESTATION
![Page 9: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/9.jpg)
9
TRUSTED SPACE
The execution space is protected from external software attacks such as a virus.
Trusted space is set up and maintained by nexus .
![Page 10: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/10.jpg)
10
SEALED STORAGE
Sealed storage is an authenticated mechanism allows a program to store secrets that cannot be retrieved by no trusted program such as a virus or Trojan horse.
![Page 11: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/11.jpg)
11
ATTESTATION
Attestation is a mechanism that allows the user to reveal selected characteristics of the operating environment to external requestor
![Page 12: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/12.jpg)
12
SOFTWARE COMPONENTS
NEXUS
TRUSTED AGENT
![Page 13: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/13.jpg)
13
NEXUS
Technology formerly referred to as the Trusted Operating Root(TOR).
The nexus executes in kernel mode in the trusted space.
It provides basic services to trusted agents
![Page 14: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/14.jpg)
14
TRUSTED AGENT
Trusted agent is a program a part of a program ,or a service that runs in user mode in the trusted spaceA Trusted agent calls the nexus for security related services and critical general services such as memory management
![Page 15: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/15.jpg)
15
Know Element of PalladiumThe system will store personal data with in an encrypted folder.
The system will filter
The system has personal information sharing agent called”My Man”.
The system will depend on hardware that has either a digital signature or tracking number.
The system purports to stop viruses by preventing the running of malicious programs
![Page 16: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/16.jpg)
16
COMPARISON OF TCPA and PALLADIUM
TCPA Stands for Trusted Computing Platform Alliance, an initiative led by Intel.
Palladium is a software that Microsoft says it plane to incorporate in future version of Window.
![Page 17: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/17.jpg)
17
ADVANTAGES OF PALLADIUM
BLOCK MALICIOUS CODE
DIGITAL RIGHT MANAGEMENT
![Page 18: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/18.jpg)
18
DISADVANTAGES OF PALLADIUM
UPGRADES
INTEROPERABILITY
LEGACY PROGRAMS
![Page 19: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/19.jpg)
19
CONCLUSION This technology will provide tougher security
defenses and more abudnat privacy. Palladium users will have unparallel power over
system integrity ,Personal privacy and data security.
A new generation of Palladium compatible hardware and peripherals will need to design and built.
Palladium is not a magic bullet. It provided the trustworthiness necessary to
enable business ,government and individual to fully embrace the increasing digitization of life.
![Page 20: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/20.jpg)
20
FUTURE ENHANCEMENT
Palladium could easily becomes a requirement for future Window Microsoft has been some cool enhancement in 2010 version
![Page 21: 1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION Next Generation Secure Computing Base,formerly known as Palladium. The aim for palladium is.](https://reader036.fdocuments.us/reader036/viewer/2022062423/56649eb25503460f94bb8c80/html5/thumbnails/21.jpg)
21