Although making changes in hardware is not the only means to enhance security, it still holds the undefeatable advantages for security comparing with software. Trusted computing is such a kind of security technology that relies on the basis of making changes in hardware. Moreover, thus technology is already developed relevant standard specifications and it owns advantages of stronger security and more efficiency in information communications. In the cloud computing era, whose environment requires high security for information and services, trusted computing is proposed by this paper with objective analysis, original improvement and novel evolvement by adding two new modules: Service Authentication List Management (SAL), and Configuration Dynamic Update Module, (CUM). We also present and illustrate an abstract model for Trusted Computing Applied into the Cloud.
[1]
Ahmad-Reza Sadeghi,et al.
A protocol for property-based attestation
,
2006,
STC '06.
[2]
Dengguo Feng,et al.
Study on Cloud Computing Security: Study on Cloud Computing Security
,
2011
.
[3]
Dai Yiqi.
Trusted computing model based on server-end storage
,
2009
.
[4]
Ahmad-Reza Sadeghi,et al.
Property-Based TPM Virtualization
,
2008,
ISC.
[5]
Butler W. Lampson,et al.
A Trusted Open Platform
,
2003,
Computer.
[6]
Zhidong Shen,et al.
The security of cloud computing system enabled by trusted computing technology
,
2010,
2010 2nd International Conference on Signal Processing Systems.