• DocumentCode
    3140267
  • Title

    The analysis and design of trusted computing applied into cloud

  • Author

    Liu, Huanan ; Wang, Shiqing

  • Author_Institution
    Inf. Eng. Dept., Zhengzhou Univ., Zhengzhou, China
  • fYear
    2012
  • fDate
    16-17 July 2012
  • Firstpage
    5
  • Lastpage
    9
  • Abstract
    Although making changes in hardware is not the only means to enhance security, it still holds the undefeatable advantages for security comparing with software. Trusted computing is such a kind of security technology that relies on the basis of making changes in hardware. Moreover, thus technology is already developed relevant standard specifications and it owns advantages of stronger security and more efficiency in information communications. In the cloud computing era, whose environment requires high security for information and services, trusted computing is proposed by this paper with objective analysis, original improvement and novel evolvement by adding two new modules: Service Authentication List Management (SAL), and Configuration Dynamic Update Module, (CUM). We also present and illustrate an abstract model for Trusted Computing Applied into the Cloud.
  • Keywords
    cloud computing; security of data; trusted computing; CUM; SAL; cloud computing era; configuration dynamic update module; hardware changes; information communications; security technology; service authentication list management; standard specifications; trusted computing; Authentication; Cloud computing; Computational modeling; Hardware; Virtual machining; (CUM); Configuration Dynamic Update Module; Service Authentication List Management (SAL); cloud computing; system survivability; trusted computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Control and System Graduate Research Colloquium (ICSGRC), 2012 IEEE
  • Conference_Location
    Shah Alam, Selangor
  • Print_ISBN
    978-1-4673-2035-1
  • Type

    conf

  • DOI
    10.1109/ICSGRC.2012.6287124
  • Filename
    6287124