Loading...

Solution Brief: Secure Cloud Integration with EmSPARKTM Security Suite

DOWNLOAD THE SOLUTION BRIEF

A step-by-step explanatory guide of the secure cloud integration process using the EmSPARK™.

Secure Cloud Integration with the EmSPARK™ Security Suite

Device integration with cloud platforms, such as AWS IoT Core or Microsoft Azure IoT, creates a variety of exciting opportunities for any IoT application. Cloud platforms enable management and monitoring of devices at a large scale. Integration with purpose-built analytics applications that can be used to optimize the performance of a fleet of devices, becomes practical. Additionally, today’s applications processors can deliver a rich array of data regarding the health and security state of an IoT device. This data can be used to identify and address threats. To take advantage of this capability, it is critical to create a mutually authenticated, secure connection between the device and the cloud platform.

...it is critical to create a mutually authenticated, secure connection between the device and the cloud platform.

To establish a mutually authenticated connection, the device and the cloud platform employ the following assets:

  1. Device Key Pair. This key pair—created during device provisioning—consists of a public key used for authentication, and a private key housed in the secure Trusted Execution Environment (TEE).  Sequitur Labs’ Trusted Execution Environment is called CoreTEE™.

  2. Device Certificate. During device provisioning, a Certificate Signing Request (CSR) is generated in order to produce a certificate signed by the device vendor’s Certificate Authority.

  3. Cloud Certificate. The Certificate Authority  of the cloud platform is loaded to the certificate repository managed in the secure TEE.

Using these assets, mutual authentication can be achieved using the following steps, using Transport Layer Security (TLS):

  • The device validates the cloud’s certificate, using its list of Certificate Authorities, which is stored securely in the device’s Trusted Execution Environment (TEE).
  • The device certificate is presented to the cloud server.
  • The cloud server authenticates the device certificate by checking it against its list of registered device certificates.   
  • The cloud server issues a challenge to the device.
  • The device responds by signing the challenge with its private key. This challenge can then be verified by the cloud server.

The EmSPARK™ Security Suite provides a Transport-Level Security (TLS) API—part of the CoreLockr™ API suite—and a TLS Trusted Application to perform the steps listed above. In the following example, the TLS Trusted Application, along with Sequitur Labs' supporting Trusted Applications (Certificate Management, Crypto, and Storage) are housed in the Secure Environment memory partition.

Secure Cloud Integration Diagram 1

For fully encrypted data transmission to the cloud, the local application can also be housed in the Trusted Execution Environment (TEE).

EmSPARK™ supports the following functions for secure cloud integration:

  1. Secure Software Provisioning during manufacturing, which provides credentials. (For more information, see the Secure Software Provisioning Solutions Brief.)

  2. Support for a secure memory enclave which houses a Trusted Execution Environment (i.e., Sequitur’s CoreTEE™).

  3. Trusted Applications for Certificate Management, Encryption, and Secure Storage.

  4. A dedicated API and Trusted Application for Transport Layer Security, used for device-to-cloud mutual authentication.

  5. A Software Developer’s Kit (SDK) which can be used to develop a Trusted Cloud Client Application

Secure Cloud Integration Diagram 2

*Photo Credit: Header Image provided by Xin on Unsplash.

Explore Our Products

Get Started with Free Evaluation Kit:

EmSparkTM for Microchip SAMA5D2 Xplained Ultra & SAMA5D27 SOM1-EK1

Download:

Sequitur Labs Whitepapers

Follow Us
Loading...