Application of Trusted Computing Technology in Cloud Computing Security

The security problem is the key to the development of cloud computing.The security requirements of cloud computing environments are analyzed.According to the functionalities provided by the key component of the TPM,the Trusted Network Connect and Trusted Storage,the trust computing technology can support cloud computing security from certification,access control,data security,user behavior tracking,compliance support,virtualization security support,emergency response and legal regulation.In this way,trust computing technology can provide protection for cloud computing security.