Improving the Security of Cloud Computing using Trusted Computing Technology

Cloud Computing is a collection of computers and servers that are publicly accessible via Internet. It is a significantly new idea that influence the power of internet to process, store and share data from a network of remote servers located anywhere in the world. That is a good way to share a many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. This paper analyses some security services in cloud computing environment and a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. Trusted Computing Platform (TCP) model can improve the cloud computing security and will not bring much complexity to users. In this model, some important security services including encryption, authentication, integrity and confidentiality are provided in cloud computing system.

[1]  Tal Garfinkel,et al.  Flexible OS Support and Applications for Trusted Computing , 2003, HotOS.

[2]  Mohammad Nauman,et al.  Towards platform-independent trusted computing , 2009, STC '09.

[3]  Balachandra Reddy Kandukuri,et al.  Cloud Security Issues , 2009, 2009 IEEE International Conference on Services Computing.

[4]  Rao Mikkilineni,et al.  Cloud Computing and the Lessons from the Past , 2009, 2009 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[5]  Haklin Kimm,et al.  Security in Distributed Computing , 1998, Scalable Comput. Pract. Exp..

[6]  Ed Dawson,et al.  Privacy and trusted computing , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[7]  Zhidong Shen,et al.  The security of cloud computing system enabled by trusted computing technology , 2010, 2010 2nd International Conference on Signal Processing Systems.

[8]  P. Visalakshi,et al.  International Journal of Modern Engineering Research (IJMER) www.ijmer.com Pp-63-69 ISSN: 2249-6645 , 2013 .

[9]  Martín Abadi,et al.  Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..