DocumentCode :
3140267
Title :
The analysis and design of trusted computing applied into cloud
Author :
Liu, Huanan ; Wang, Shiqing
Author_Institution :
Inf. Eng. Dept., Zhengzhou Univ., Zhengzhou, China
fYear :
2012
fDate :
16-17 July 2012
Firstpage :
5
Lastpage :
9
Abstract :
Although making changes in hardware is not the only means to enhance security, it still holds the undefeatable advantages for security comparing with software. Trusted computing is such a kind of security technology that relies on the basis of making changes in hardware. Moreover, thus technology is already developed relevant standard specifications and it owns advantages of stronger security and more efficiency in information communications. In the cloud computing era, whose environment requires high security for information and services, trusted computing is proposed by this paper with objective analysis, original improvement and novel evolvement by adding two new modules: Service Authentication List Management (SAL), and Configuration Dynamic Update Module, (CUM). We also present and illustrate an abstract model for Trusted Computing Applied into the Cloud.
Keywords :
cloud computing; security of data; trusted computing; CUM; SAL; cloud computing era; configuration dynamic update module; hardware changes; information communications; security technology; service authentication list management; standard specifications; trusted computing; Authentication; Cloud computing; Computational modeling; Hardware; Virtual machining; (CUM); Configuration Dynamic Update Module; Service Authentication List Management (SAL); cloud computing; system survivability; trusted computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Control and System Graduate Research Colloquium (ICSGRC), 2012 IEEE
Conference_Location :
Shah Alam, Selangor
Print_ISBN :
978-1-4673-2035-1
Type :
conf
DOI :
10.1109/ICSGRC.2012.6287124
Filename :
6287124
Link To Document :
بازگشت