Use this URL to cite or link to this record in EThOS:
Title: Identifying trust properties and developing trusted systems for end-to-end trust
Author: Yap, Jiun Yi
ISNI:       0000 0004 8499 2157
Awarding Body: Royal Holloway, University of London
Current Institution: Royal Holloway, University of London
Date of Award: 2016
Availability of Full Text:
Access from EThOS:
Access from Institution:
End-to-end trust is regarded as a game changer for the assurance of distributed and heterogeneous computing environments. It refers to the collection of technologies, user behaviours, implementations and infrastructures that can enable a predictable level of trust in the computing environment. In order to establish endto-end trust, we first need to identify trust properties that reflects the make up of a trusted system. This is followed by the development of this trusted system that spans hardware, software, people and data. The first part of the thesis reports our work on identifying trust properties. We first describe a study that looks at how computer users perceive trust notions and the relationship between these perceptions and the stake involved in practical Information Technology scenarios. This work provides an up-to-date understanding of trust notions. Then, to address the challenge of describing the make up of a trusted system, we offer a novel causality-based model. This model represents information about the dependencies between trust notions, capabilities, computing mechanisms and their configurations. We also introduce a new approach to attestation which is founded on the use of provenance data. A complete design of this attestation technique is given. This is followed by building key mechanisms to explore implementation approaches to provenance-based attestation. The second part of the thesis looks at the challenges of developing trusted systems which contain the building blocks of trust properties. We develop an ontology that describes the capabilities of a computing device secured with the Trusted Platform Module (TPM) 2.0. The aim is to enable experts to share a common understanding of such technologies with developers using a standard vocabulary. We then develop a use scenario of TPM 2.0 and investigate the use of threat modelling on this scenario. Finally, we look at using TPM 2.0, as a building block of trust properties, in a modern system and propose a framework for para-virtualizing TPM 2.0.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available
Keywords: Trusted Computing