Question

In: Computer Science

Bob has developed a very secure solution for data integrity in a cloud. This solution requires...

Bob has developed a very secure solution for data integrity in a cloud. This solution requires adding a $20 TPM chip to each computer in a data center. Is this solution practical? Please explain briefly.

Solutions

Expert Solution

Yes adding TPM chip to computers in data center is the right solution and also practical. Let me justify my answer.

I am explaining by raising various question and answering the same.

TPM: Trusted Platform Module

What is TPM?

A protecting chip which secures the system from both outside and inside attack.

Use of TPM: Though there are many anti-virus software and other essentail software is installed to protect the system in clouds, still hackers attack the system. To avoid this TCG (Trusted Computing Group) has designed an hardware chip called TPM to protect the cloud system.

Is TPM hardware or software? TPM is a hardware which is present on the motherboard to protect the system from various attacks.

How TPM works?

There is a key called "Endorsement key" to protect the data. This is not exposed or shared to any other component, which makes TPM more relaiable. Endoresement key will be present inside the TPM itself.

Highlight of TPM:

TPM provides Remote attestation. Let us understand the term attestation. "Attestation means a guessetted officer places his signature by confirming that the document is right". In a similar way TPM provides remote attestation to authenticate itself to a remote requiest. AIKs are used for this purpose.

AIKs - Attestation Identity Keys

Considering all the above information Bob has chosen the right way to secure the cloud.


Related Solutions

FuncoLand has developed an efficient, new cloud server that that it can sell to other corporations...
FuncoLand has developed an efficient, new cloud server that that it can sell to other corporations to boost online operations and stability. For FuncoLand, it would cost $10,000,000 at Year 0 to buy the equipment necessary to manufacture the server. The project would require net working capital at the beginning of each year in an amount equal to 10% of the year’s projected sales; for example, NWC0 = 10% (Sales1). The servers would sell for $24,000 per unit, and specialists...
FuncoLand has developed an efficient, new cloud server that that it can sell to other corporations...
FuncoLand has developed an efficient, new cloud server that that it can sell to other corporations to boost online operations and stability. For FuncoLand, it would cost $10,000,000 at Year 0 to buy the equipment necessary to manufacture the server. The project would require net working capital at the beginning of each year in an amount equal to 10% of the year’s projected sales; for example, NWC0 = 10% (Sales1). The servers would sell for $24,000 per unit, and specialists...
A pendulum clock has a heavy bob supported on a very thin steel rod that is...
A pendulum clock has a heavy bob supported on a very thin steel rod that is 1.00000 m long at 21.0 ∘C. a)To 6 significant figures, what is the clock's period? Assume that g is 9.80 m/s2 exactly. b)To 6 significant figures, what is the clock's period if the temperature increases by 13.0 ∘C? Assume that coefficient of linear expansion of steel is 1.20×10−5 K−1 . c)The clock keeps perfect time at 21.0 ∘C. At 34.0 ∘C after how many...
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based...
Company XYZ has decided to make use of a cloud-based service that requires mutual, certificate- based authentication with its users. The company uses SSL-inspecting IDS at its network boundary and is concerned about the confidentiality of the mutual authentication. Which of the following model prevents the IDS from capturing credentials used to authenticate users to the new service or keys to decrypt that communication? Use of OATH between the user and the service and attestation from the company domain Use...
Consider a startup that has developed an innovative solution based on new technology that it is...
Consider a startup that has developed an innovative solution based on new technology that it is the basis for a new venture that it has launched. Suppose the startup is quickly acquired by an industry incumbent not long after launching the venture. What type of innovation does the new venture most likely have under Clayton Christensen's theory of disruptive innovation? Explain.
Suppose a technology company developed a pair of very fashionable Augmented Reality eyeglasses. The firm has...
Suppose a technology company developed a pair of very fashionable Augmented Reality eyeglasses. The firm has a marginal cost of $700 for each pair of glasses produced. A restriction prohibits the firm from setting different prices in France and Italy. The two countries have the following inverse demands: Pfrance = 4200 - 1/3QFrance Pitaly = 5595 - 3/2Qitaly If the firm can charge different prices in each country, what would QItaly be? What price would the firm set?
Suppose a technology company developed a pair of very fashionable Augmented Reality eyeglasses. The firm has...
Suppose a technology company developed a pair of very fashionable Augmented Reality eyeglasses. The firm has a marginal cost of $700 for each pair of glasses produced. A restriction prohibits the firm from setting different prices in France and Italy. The two countries have the following inverse demands: Pfrance = 4200 - 1/3QFrance Pitaly = 5595 - 3/2Qitaly What is Qpooled?\
A Project plan has been developed by the project team. The scheduled data are given in...
A Project plan has been developed by the project team. The scheduled data are given in the following table Activity predecessor Normal time Crash Time Normal cost Crash COST COST SLOPE A - 12 7 3000 5000 400 B A 8 5 2000 3500 500 C A 4 3 4000 7000 3000 D B,C 12 9 50000 71000 7000 E B,C 4 1 500 1100 200 F E 4 1 500 1100 200 G D,F 4 3 15000 22000 7000...
Imagine that a company has developed an advanced technology that allows it to reduce its data...
Imagine that a company has developed an advanced technology that allows it to reduce its data center requirements by an unprecedented amount, and creates a competitive advantage for the company in the data center market. Why should it share that technology with other data center firms? If this firm does not share its techniques, the rest of the industry will continue to operate less efficient centers, and increase global emissions of green house gases above what they would otherwise be.
Novelli's Nursery has developed the following data for lower of cost or market for its products....
Novelli's Nursery has developed the following data for lower of cost or market for its products. The individual types of trees are separated as to their categories: Selling Cost to Price Cost Replace Broad leaf trees: Ash $1,800 $1,000 $800 Beech 2,200 1,600 1,400 Needle leaf trees: Cedar $2,500 $1,750 $1,800 Fir 3,600 3,350 3,200 Fruit trees: Apple $1,800 $1,400 $1,300 Cherry 2,300 1,800 1,700 The costs to sell are 10% of the selling price, and the normal profit margin...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT