
Implementation of Security Operating System based on Trusted Computing
This paper presents the design and implementation of a security operating system based on trusted computing. It discusses the trusted computing platform, security models, behavior predictability, and the trusted computing platform's structure. The study focuses on enhancing security through trusted computing principles, improving the BLP security model to IBLP, and demonstrating the effectiveness and feasibility of the proposed system through experiments.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Design and Implementation of Security Operating System based on Trusted Computing 1 AUTHORS X. NIE, D. FENG, J. CHE, X. WANG PRESENTED BY- PREOYATI KHAN KENT STATE UNIVERSITY
Contents 2 Introduction Trusted computing platform Security model for trusted computing Security operating system for trusted computing Experiment and Performance Conclusions
Introduction 3 Analyzes and reviews relative work of security operating system based on trusted computing. Classical security model BLP is improved to get IBLP. The overall design scheme and modularized implementation of a secure system for trusted computing. Experiment result to show effectiveness and feasibility of their system.
Trusted computing 4 Behavior is predictable in any operating condition. Highly resistant to subversion by application software, viruses and a given level of physical interference.
Trusted Computing Platform 5 Allows systems to extend trust to clients running on these platforms. Provides open platforms: wide availability, diverse hardware types, and the ability to run many applications from many mutually distrusting sources while still retaining trust in clients.
Trusted Computing Platform(cont.) 6 TCPA/TCG structure contains 4 essential factors. TPM(Trusted Platform Module). Core of hardware level security framework. Generates encryption key. Protects BIOS and the OS from malicious activity. CRTM( Core Root Trust Module). Initializes entire systems and authenticates BIOS. TCPA OS. Supports hardware modules and applications. Launches TCPA control function . Compatibility. Allows the existing computer system hardware foundation to exists continuously. 1. 2. 3. 4.
Trusted Computing Platform(cont.) 7 TCPA Application TCPA Operating System TPM CRTM CPU Other Chips Trusted Part Present Part Figure1: TCPA/TCG system structure
Security model for trusted computing 8 BLP model: simulates a computer system accord with military security policy. In BLP there are 4 access attributes: e access (execute with neither observe nor alter) r access (observe with no alter) a access (alter with no observe) w access (both observe and alter)
Security model for trusted computing(cont.) 9 BLP denotes B(S,O,A) to denote the current access state set. S - set of subject O - set of object A - access attribute, consists of e access, r access, a access and w access.
Security model for trusted computing 10 Two important axiom: ss- property and star property. Simple security(ss-property): * Property (Star property):
Security model for trusted computing 11 Problems with BLP model: Trusted subject does not have star property constraint Too large access privilege Does not match minimum privilege principle. Lack of integrity control.
Design of IBLP security model 12 The authors of this paper designed a security model based on trusted computing through the improvement of BLP and called it IBLP.
Definition of IBLP 13 Security attribute. Security attribute for each subject and object includes- Confidentiality level Sc Integrity level Si Access category sets Ca 2. Security domain. The security domain of subject S can be classified as common subject C and trusted subject T. 1.
Axiom of IBLP 14 Simple security property(Ss-property). 1. 1 and 2 : common subject can neither observe nor execute information of the object on the higher confidentiality level. lower integrity level. 3 and 4 : Trusted subject on the lower confidentiality level can neither observe nor execute information of the object on the higher confidentiality level. But can observe and execute information of the object, lower integrity level.
Axiom of IBLP 15 Star-property. 1. 5 and 6 : common subject can only alter information of the object on the same confidentiality and integrity level . 7 and 8 : Trusted subject on the lower integrity level can not alter information of object on the higher integrity level but can alter information of object on the lower confidentiality level.
Axiom of IBLP 16 Simple security property(Ss-property). 1. 2. Star-property.
Analysis of IBLP 17 Consistent with the basic security feature of BLP. ss-property of IBLP is consistent with the ss-property of BLP. The star property of IBLP can be seen a special case of the star-property of BLP. 2. Meets the principle of minimum privilege. 3. Prevents the occurrence of covert channel. 4. Meets the security requirement of trusted computing in a more flexible way. 1.
Security operating system for trusted computing 18 Figure 2. The overall design
Security operating system for trusted computing (cont.) 19 Modular implementation: Modularly developed and implemented on an open code Linux environment. Trusted identification: Is used to ensure that only legitimate users can access the system resources.
Security operating system for trusted computing (cont.) 20 Privileged access control: Ensures that a trusted process only gets the security privilege that meets the requirement of its task. Discretionary access control: Uses ACL defined by user to implement access control of resources. <Type, Id, Perm> Mandatory access control: Manages system resources by classifying them according to their security level.
Security operating system for trusted computing (cont.) 21 Integrity Measurement: Mainly protects the content continuously loaded by OS after secure boot of TPM. Figure 3: TPM-based Integrity Measurement
Security operating system for trusted computing (cont.) 22 Security audit: Audits any security related events Generate and reveal secret information for system manager to control security situation.
Experiment and Performance 23 Security Function: Can detect and defend most of the attack at present. Table 1. Rate of detection for typical attack. Attack type IP cheating Buffer Overflow Denial of Service Rootkit Rate of detection 80% 85% 87% 95%
Experiment and Performance(cont.) 24 Decline of Performance: The decline rate of efficiency is no more than 10% Table 2. decline rate of efficiency. Test project Decline rate Test ipc Test fork Test fs 8% 10% 10%
Conclusions 25 Improved traditional security model BLP, and designed a trusted computing based security model IBLP. Presented the design and implementation of a secure operating system for trusted computing platform.
Conclusions(cont.) 26 Will improve the system to be more compatible with the security requirement of trusted computing application. Will adopt optimizations algorithms to improve the performance.
27 Thank You