Research on Cloud Computing Security Based on the Remote Attestation

2013 ◽  
Vol 321-324 ◽  
pp. 2657-2664
Author(s):  
Fu Xie ◽  
Yun Yun Du

Cloud computing security has become a key problem of restricting the development of cloud computing, solving the cloud computing security problem has been extremely urgent. At present, it has become a new favorite in the cloud computing security research field that trusted computing is used to solve the cloud computing security, this paper uses remote attestation in trusted computing to solve the cloud computing security problems. In a cloud computing environment, the service provider not only needs to provide reliable components, but also needs to ensure that the computing platform system is reliable. In this paper, in view of the characteristics of the cloud computing platform, these two approaches are consolidated and improved, and a proof method based on the component properties and the system behavior (CPTBA) is put forward.

This chapter provides a literature review and the related work about the insider attacks and solutions in cloud environment. The authors classified solutions into three categories: trusted computing-based approaches, encryption-based approaches, and virtualization-based approaches. The trusted computing approaches use remote attestation, sealed storage, and integrity measurement. Encryption-based approaches use the cryptographic operations along with cloud computing security mechanisms and policies. Virtualization-based approaches use the virtualization technology to solve critical security issues using trusted computing approaches. At the end of this chapter, they compare various solutions and summarize the problems and solutions.


Author(s):  
Prasanta K. Manohari ◽  
Niranjan K. Ray

Cloud computing is one of the emerging technology in the recent times which has varieties of applications at different fields. It is an Internet dependent technology and it store and maintain the data in a cloud data center. Cloud center usually supports more numbers of user, applications and data. In the same time, it also suffered with numerous challenges. Security is a key requirement for cloud data center. Different security mechanisms are proposed for cloud computing environment. In this chapter, we address the background of cloud computing, security risk, requirements, issues, and some of the security techniques are discussed. We discuss different security issues and focus on some existing solutions.


2016 ◽  
pp. 1053-1066 ◽  
Author(s):  
Nitin Nagar ◽  
Ugrasen Suman

Cloud computing is comprised of major demand from the every group of organization because of easy availability and cost effectiveness. The responsibilities of cloud service providers will become increasing more due to the great progression in every cloud computing deployment model (public, private and hybrid) and service models (SaaS, PaaS and IaaS). In this perspective, cloud computing faces multiple challenges, especially in cloud computing security at all levels (e.g., host, network, application and data levels). Authentication is the constantly the biggest concerned for IT industries to adopt cloud computing environment. The availability, performance, key logger attack, malicious insiders, outsider attacks and service disruptions explore (service hijacking) issues are the key research challenges in the cloud computing authentication level. In this aspect, traditional user name and password is not enough as a single factor (first factor). This paper has proposed a secure cloud computing framework which uses first factor as a crypt user name and password with the ATM pin as a second factor called M-pin. The proposed work focuses on a solution to the threats that are the major issues in the cloud adoption.


2018 ◽  
Vol 7 (3.1) ◽  
pp. 106
Author(s):  
Arul Sindiya J ◽  
Pushpalakshmi R

Cloud computing is the most emerging and powerful technology in the IT world. The interesting features with enhancement facilities grab the attention of the researchers into its field. Its special kind is pay-as-you-go model for the consumers, by this way the user may this service as they want like as infrastructure, platform and software according to their needs. Cloud computing is an effective management system which built a great relationship between the consumer and the cloud owner’s. However there is a positive aspect still some negatives makes the cloud computing still research field. Some of the major drawbacks still to be discussed were fault tolerance, load balancing and security. The main concept need to be discussed is load balancing; it is mainly depend on requesting the resource services. Some of the key points in load balancing is optimization in resources usage, minimum response time, boost turnout and enabling free from needless burden. Another critical issue is increased user list and cloud application types. In this exploration we focused for Load balancing, how to balance and constructed a present day strategy in a distributed computing condition. Before construct an apparatus how about we do a point by point overview look into in different existing load balancing procedures and cloud analyst tool by various authors.  


Author(s):  
Wei Min Ding ◽  
Benjamin Ghansah ◽  
Yan Yan Wu

Virtualization and Cloud computing are two popular research directions in recent times. Today, Virtualization is being used by a growing number of organizations to reduce power consumption, Server Consolidation, Testing and Development, Dynamic Load Balancing and Disaster Recovery, Virtual Desktops and Improved System Reliability and Security. Virtualization also provides high availability for critical applications, and streamlines application deployment and migrations. Through cloud computing, Information Technology resources can be delivered as services over the Internet to the end user. Virtualization is one of such important core technologies of cloud computing. In this paper, we present a detailed review on virtualization. Furthermore, three technologies for x86 CPU virtualization and the architecture of Xen are introduced. Specifically, we propose an architecture of the cloud computing platform based on virtualization. Finally, we discuss the performance evaluation of server virtualization in saving cost, time and energy consumption.


2013 ◽  
Vol 278-280 ◽  
pp. 1962-1965
Author(s):  
Song Fei ◽  
Xiao Jing Wang ◽  
Zhe Cui

Proposed a new trust model based on P2P technology in the cloud computing environment. The model takes into account more than one cloud computing platform, that is, considering the different cloud computing service provider provide the service of a cross-cloud platform. Such cross-platform cloud (Cross Cloud) can be called the composite cloud computing platform or cloud associated cloud computing platform.The nodes in the cloud computing environment are divided into two categories: customers and providers. According to the different roles of these two nodes, we designed a different trust mechanism, to divide the trust domain with independent single cloud, considered node independence and manageability of domain to process trust choice and trust update, and proposed a new kind of cloud computing service - trust recommendation service.


Sign in / Sign up

Export Citation Format

Share Document