1)      Welcome Remarks

2)      The advancement of Cloud Computing and Tursted Computing national standard

Speaker:  Xiangang Liu, Deputy Secretary of TC260, CESI

TC260 have released 3 standards: a) GB/T 29829-2013: Specification of functionalities and interfaces of trusted computing password support platform; b) GB/T 29827-2013 Interface of motherboard of trusted platform; 3) GB/T 29828-2013: Trusted Connected architecture and is creating one standard: Test specification of trusted connectivity

3)      Trusted Computing Group vision and Strategy

Speaker: Mark Schiller, Executive Director of TCG

4)      SMx support in ISO/IEC 11889 TPM2.0

Speaker: Liu Xin, Director, NationZ Technologies

TPM2.0 supports SMx (cryption algorithm created by China): SM4, SM2 and SM3

5)      China Trusted Cloud Computing Community

Speaker: Prof. Zhang HuanGuo, WuHan university

He mentioned security issues specific to Cloud computing: 1) Basically these issues are caused by Resource sharing: almost unlimited resource, but user don’t know whether these resources are trusted; almost existing-in-everywhere services but users don’t know whether it is trusted; almost unlimited storage space, but users don’t feel the existence of their data and don’t know whether their data is secure and furthermore, they cannot control their data as per their will. 2) User worries about the following items: security(system crash, malware/virus, data loss, data tampered), privacy leaking, not able to sense their own data, not able to control their data, lack of insurance of incidents.

In 2012, China Sig TC is founded to address the above issues. The founders are WuHan university, Intel, NationZ, Huawei, CS2C, Daoli Cloud, BaiAo. The roadmap is “Trusted Cloud server -> Trusted Cloud Terminal -> Trusted Network connectivity -> Typical Trusted application”.

He mentioned that in 2013, HuaWei released a trusted server, which support trusted boot, TXT to measure, support TPM2.0/TCM, support China business password, support trusted boot/running/migration of virtual machines.

6)      Securing IoT with Trusted Computing (including Demo)

Speaker: Stefan Thom, Principal Engineer, Windows Division, Microsoft

There are a lot of improvements of security and trust in windows 10, comparing with win7, which can also be leveraged in IoT.

There are some security issues specific to IoT: a) Deployed on unsecure location; b) requires long-period security; c) Too many sensors/clients to be managed one by one; d) remote management; e)  intermittent connectivity; f) requires firmware/embedded os upgrade to keep secure; g) store confidential data.

Give a demo using Raspberry motherboard with NationZ’s TPM2.0 chipset connected through I2C, use TPM to protect symmetric key of Azure Central devices ‘s identity. It demonstrates that it can create and protect the identity of devices and that keep confidential data even if malware intruded in.

There are a lot of use cases which TPM can work: a) create and protect hardware identity; b) defends malwares intruding including protecting confidential data after malware intrudes in; c) prevent hardwares from being tampered; d) meet the requirements of encryption protocols

7)      Trusted IoT

Speaker: Intel China

It basically introduces how TCG standards are used in IoT (It is nothing special, so I don’t mentioned here)

8)      Thinking about Beijing municipal government cloud

9)      Secure “Industry 4.0” with TPM

Speaker: Amy Yu, marketing manager for Platform Security, Infineon

There are 3 basic layers in industry 4.0 architecture: Server, devices, network. Each layers can be attacked. So Trusted anchors/key integrity are essential for system security, which includes 3 aspects: key store, Crypto operation, key management.

There are 6 basic security use cases:

a) authentication to address who am I talking to;

b) Secured Communication to address the question that whether software or data can be secured during transferring;

c) Confidentiality with secured storage to address the question that whether my data or credential can be accessed by an attacker;

d) System&Data integrity: to address the question that whether my system and data is not manipulated and whether a 3rd party can verify that information;

e) Value chain support(dedicated functionalities for manufacturerers, platform owners, OS providers and more): to address the question whether security can be transported through the lifecycle and whether each owner can take ownership

f) Software/firmware upgrade: to address the question whether the software/firmware be secured during transfer

So a basic secure industry 4.0 by TPM contains TPM-enabled server, TPM enabled Gateway and TPM enabled Control equipment(main MCU).

10)    Trusted Computing based Next Generation Secure Cloud Framework

Speaker: Chi Zheng, Deputy General Manager of Trusted computing section, DaTao GoHigh

CTrust Servers are invented by DaTao GoHigh(at least they claimed) and actively-immune architecture based on x86 and supports TCM and ISO/IEC11889-2015(TPM2.0). It is embedded with domestic-produced trusted module which is certified by National Encryption  Bureau and use TCM and TPCM to implement the functionality of security from CPU power-on point.

They also introduce a system which can show the turst status and asset/geography tagging, which is very similar with Intel OAT/CIT.

11)   SOTP-mobile trusted cloud security support technology

Speaker: Qiang Zhou, CSO of Peoplenet

It is about Single-one-tome password.

12)   Innovation Strategy for Cross Platform Trusted Computing Solutions

Speaker:  Dr. Gongyuan Zhuang, Security Architect, AMD Corp.

There is a new Security processor, which should exists in the same AMD SoC with AMD64/ARMv8.  It is 32-bit microprocessor and it use separated ROM/SRAM in SoC, and be able to access main system’s memory and resources.

There are 3 TPM solutions: 1) Separated TPM: Use 3rd-party vendor’s TPM chips; 2) Solid-state software TPM; 3) Software TPM.

13)    Inspur Trusted Computing Technology Research and Applications

Speaker: Gang Liu, manager of Software security Division, Inspur Electronics Industry Ltd.

3 measurements to build trusted relationship: a) reliable technology system(computing security/network security, …), b) proper management system(certification, audit, governance, …), c) healthy law insurance. Then the speaker introduces Inspurs’ InCloud manager and there is Trusted Management Platform in InCloud Manager which can shows the trusted status in hosts and virtual machines.

There are 3 main features for Trusted Management Platform:

a)       It can detects any tamper of server hardwares and vritual machine softwares during boot up;

b)       ensure that critical virtual machines are launched on trusted hosts.

c)       security-label-based access control: the label is based on grade, scope and location

Inspurs also has an innovation on actively measuring trusted status based on BMC.

14)   A new Model for Enterprise Cloud Security

Qiang Du, Directory of network Security Technology Research

The basic idea is Software-Defined Security and it collects all network flow information and uses Enforce Learning to get a model for normal network flow and then will give alert if any innormal network flow occurs.

15)   Trusted Computing Application in Telecommunication Devices

Rui Zhang, Director of Security technology Research, HuaWei Group

TPM chip as hardware trusted root is the base of software integrity measurement.

How to ensure that VSS software stack security: introduce grsecurity, TDCLI, TCSI(TSS Core Service Interface) aTSPI.

How to Resovle integrity measurement of 7*24 running devices? Periodically measure.

In NFV area, the current TPM doesn’t support virtualization and hence we have to depend on vTPM  and the security of vTPM depends on the security of virtualization.

He also mentioned how to deal with virtual machine escape.

16)   TPM 2.0 Application in CS2C NeoKylin Trusted Operating System

Weijian Zhu, Director of Security Business, ZHong Biao Ruan Jian

NeoKylin OS introduction:  a) system security grade meets GB/T20272-2006 the fourth grade; b) integrity TPM2.0 and TSS2 software stack; c) support TXT/tboot to trusted boot and configuration tools; d) trusted running control; e) trusted white-list management.

Summary of 2016 International Trusted Computing and Cloud Security Summit的更多相关文章

  1. 12月2日,上海Cloud Foundry Summit, Azure Cloud Foundry 团队期待和你见面!

    12月2日,上海Cloud Foundry Summit, Azure Cloud Foundry 团队期待和你见面! 12日2日对中国Cloud Foundry的用户和开源社区来说,是极有意义的一天 ...

  2. 使用Spring Cloud Security OAuth2搭建授权服务

    阅读数:84139 前言: 本文意在抛砖引玉,帮大家将基本的环境搭起来,具体实战方案还要根据自己的业务需求进行制定.我们最终没有使用Spring Security OAuth2来搭建授权服务,而是完全 ...

  3. Spring Cloud Security&Eureka安全认证(Greenwich版本)

    Spring Cloud Security&Eureka安全认证(Greenwich版本) 一·安全 Spring Cloud支持多种安全认证方式,比如OAuth等.而默认是可以直接添加spr ...

  4. Spring Cloud Security OAuth2.0 认证授权系列(一) 基础概念

    世界上最快的捷径,就是脚踏实地,本文已收录[架构技术专栏]关注这个喜欢分享的地方. 前序 最近想搞下基于Spring Cloud的认证授权平台,总体想法是可以对服务间授权,想做一个基于Agent 的无 ...

  5. 妹子始终没搞懂OAuth2.0,今天整合Spring Cloud Security 一次说明白!

    大家好,我是不才陈某~ 周二发了Spring Security 系列第一篇文章,有妹子留言说看了很多文章,始终没明白OAuth2.0,这次陈某花了两天时间,整理了OAuth2.0相关的知识,结合认证授 ...

  6. Tagging Physical Resources in a Cloud Computing Environment

    A cloud system may create physical resource tags to store relationships between cloud computing offe ...

  7. Cloud Computing Chapter3 (云计算第三章)

    本篇文章是对课程大型软件系统设计与体系结构(双语)[又名:云计算]的课堂内容总结,适用于大连交通大学. Cloud Computing Chapter3 Understanding Cloud Com ...

  8. Spring Cloud Summary

    Spring Cloud Summary https://cloud.spring.io/spring-cloud-static/Finchley.RC1/single/spring-cloud.ht ...

  9. CNCF LandScape Summary

    CNCF Cloud Native Interactive Landscape 1. App Definition and Development 1. Database Vitess:itess i ...

随机推荐

  1. [存档]获取通讯录信息并写到SD卡上

      下面是代码,不过没有字母表的顺序排列: package com.example.getcontacts; import java.io.FileWriter; import java.io.IOE ...

  2. 【Codeforces 947A】 Primal Sport

    [题目链接] 点击打开链接 [算法] 不难看出,x1的范围是[x2-P(x2)+1,x2],x0的范围是[x1-P(x1)+1,x1] 我们可以先做一遍线性筛,然后暴力就可以了 [代码] #inclu ...

  3. LeNet-5结构分析及caffe实现————卷积部分

    占坑,记录 1.lenet-5的结构以及部分原理 2.caffe对于lenet-5的代码结构 图一 图一是整个LeNet-5的结构图,要点有:convolutions.subsampling.full ...

  4. k8s-存储卷1-十二

    因为pod是有生命周期的,pod一重启,里面的数据就没有了.所以我们需要数据持久化存储. 在k8s中,存储卷不属于容器,而是属于pod.也就是说同一个pod中的容器可以共享一个存储卷. 存储卷可以是宿 ...

  5. NYOJ7——街区最短路径问题

    街区最短路径问题 时间限制:3000 ms  |  内存限制:65535 KB 难度:4  描述:一个街区有很多住户,街区的街道只能为东西.南北两种方向.住户只可以沿着街道行走.各个街道之间的间隔相等 ...

  6. GCC在C语言中内嵌汇编 asm __volatile__

    2012-11-26 22:20 17958人阅读 评论(2) 收藏 举报  分类: linux(59)  架构管理(24)  C/C++(59)  目录(?)[+] 在内嵌汇编中,可以将C语言表达式 ...

  7. Codeforces - 773A - Success Rate - 二分 - 简单数论

    https://codeforces.com/problemset/problem/773/A 一开始二分枚举d,使得(x+d)/(y+d)>=p/q&&x/(y+d)<= ...

  8. Android笔记---常用控件以及用法

    这篇文章主要记录下Android的常用控件以及使用的方法,Android 给我们提供了大量的UI控件,合理地使用这些控件就可以非常轻松地编写出相当不错的界面,这些是Android学习的基础,没有什么业 ...

  9. Mac下的常用终端命令与vim常用命令

    因为很少用命令行,老被鄙视,所以今天记录一下常用的命令行: cd 切换工作目录 . 表示当前目录 .. 表示当前目录的上一级目录 / 根目录/目录分隔符 ./ 当前目录 ../ 回到上一级目录 ls ...

  10. 一篇文章搞定面试中的链表题目(java实现)

    最近总结了一下数据结构和算法的题目,这是第二篇文章,关于链表的,第一篇文章关于二叉树的参见 废话少说,上链表的数据结构 class ListNode { ListNode next; int val; ...