Trusted Computing Technology and Proposals for Resolving Cloud Computing Security Problems

2020 ◽  
pp. 373-386
Author(s):  
Ignazio Pedone ◽  
Daniele Canavese ◽  
Antonio Lioy
2011 ◽  
Vol 186 ◽  
pp. 596-600 ◽  
Author(s):  
Ji Yi Wu ◽  
Qian Li Shen ◽  
Jian Lin Zhang ◽  
Qi Xie

Cloud computing, with exciting market prospects, has a number of potential risks and safety issues to the cloud services users. After an objective analysis of the security challenge and problem, in current cloud computing development, the latest research progress in the field of cloud security were summarized. Finally, the important research directions in the field were pointed out. It’s will be a new trend for the cloud computing and trusted computing technology to integrate..


2013 ◽  
Vol 321-324 ◽  
pp. 2657-2664
Author(s):  
Fu Xie ◽  
Yun Yun Du

Cloud computing security has become a key problem of restricting the development of cloud computing, solving the cloud computing security problem has been extremely urgent. At present, it has become a new favorite in the cloud computing security research field that trusted computing is used to solve the cloud computing security, this paper uses remote attestation in trusted computing to solve the cloud computing security problems. In a cloud computing environment, the service provider not only needs to provide reliable components, but also needs to ensure that the computing platform system is reliable. In this paper, in view of the characteristics of the cloud computing platform, these two approaches are consolidated and improved, and a proof method based on the component properties and the system behavior (CPTBA) is put forward.


This chapter provides a literature review and the related work about the insider attacks and solutions in cloud environment. The authors classified solutions into three categories: trusted computing-based approaches, encryption-based approaches, and virtualization-based approaches. The trusted computing approaches use remote attestation, sealed storage, and integrity measurement. Encryption-based approaches use the cryptographic operations along with cloud computing security mechanisms and policies. Virtualization-based approaches use the virtualization technology to solve critical security issues using trusted computing approaches. At the end of this chapter, they compare various solutions and summarize the problems and solutions.


2014 ◽  
Vol 571-572 ◽  
pp. 400-403
Author(s):  
Yan Fei Cao ◽  
Jun Ming Pan

This paper analyzed functions of the network information system based on trusted computing and trusted computing platform based on cloud computing. Raised the propose to expand the application of trusted computing technology to network information system, to meet the needs of cloud computing of trusted computing, trusted cloud computing, implement the trusted cloud computing. In our design, will take the Trusted Computing Platform (TCP) as the basis of cloud computing system, provide some important security functions to ensure the communication and data security.Finally put forward the implement methods.


Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


2019 ◽  
pp. 1-4
Author(s):  
C. T. Kantharaja

Cloud computing technology has signicant role in academic libraries. Most of the library services are available on cloud platform and library software vendors developed their Library Management Software on cloud platform. It is the right time for library professionals to upgrade their technical skills to provide good services to the library stakeholders. This study shows the library services and facilities available on cloud. It is the right time to migrate to cloud


Sign in / Sign up

Export Citation Format

Share Document