Preview

A Paper on Security in Cloud Computing

Powerful Essays
Open Document
Open Document
3993 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
A Paper on Security in Cloud Computing
The Security of Cloud Computing System enabled by Trusted Computing
Technology
Zhidong Shen
International School of Software,
Wuhan University,
Wuhan, China, 430079 zhidongshen@163.com Qiang Tong
School of Software,
Northeastern University,
Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment. We proposed a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. We propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module.
In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system.
Keywords-cloud computing; trusted computing platform; trusted computing; trusted service
I. INTRODUCTION
Since distributed systems and network computing were used wildly, security has become an urgent problem and will be more important in the future. In order to improve the work efficiency, the different services are distributed in different servers that are distributed in different places. In contrast to the fast developing of distributed computing technologies, people have remained insufficient in the field of information security and safety. In recently, a new trend attracts people’s attention. Users from multiple environment hope use the distributed computing more efficient, just like using the electric power. Then, cloud computing has become a new star for this demand. cloud computing is



References: Enabling Technologies: Infrasturctures for Colloaborative Enterises, on page(s):57-62, 2009 [2] Balachandra Reddy Kandukuri, Ramacrishna PaturiV, Atanu Rakshi, “Cloud Security Issues”, 2009 IEEE International Conference on [3] Peter Wayner, “Cloud versus cloud – A guided tour of Amazon, Google, AppNexus and GoGrid”, InfoWorld, July 21, 2008 Database and Expert Systems Applications, IEEE, 2003. [6] ISO/IEC. Information technology - Open Systems Interconnection - Evaluation criteria for information tech-nology, 1999 [8] Trusted Computing Group (TCG), "TCG Specification Architecture Overview Specification Revision 1.2", April 28, 2004. on Hot Topics in Operating Systems (HotOS IX), USENIX, 2003. Secure Computing”, IEEE transactions on dependable and secure computing, vol.1, No.1, January-March, 2004.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Security Breach Plan Paper

    • 1576 Words
    • 7 Pages

    Patient privacy and security is one of the most important aspects of the St. Johns Hospital code of conduct, they take pride in the sound policies and procedures set to maintain customer confidentiality. Each employee is held to a high standard of maintaining the highest level of privacy and confidentiality when it comes to patient health information (PHI). This paper will outline the plan that St. John’s hospital has created in case of a security breach or security threat in the facility. The primary cause of a security breach is usually related to the people or business side of and organization (Rhoades, MBA, RHIA, CHPS, CPHIMS, FHIMA, 2009).…

    • 1576 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The BSA, or Bank Secrecy Act is comprised of six parts; The Patriot Act, MITR, CTR, MIP, SAR, and OFAC. The use of all of these in tandem makes it easy to catch fraud, money laundering, Terrorist funding, Criminal organizations and more. The six parts each play their parts in this, with some being smaller and less complicated but no less important.…

    • 473 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Term Paper Intro to I.T.

    • 1605 Words
    • 7 Pages

    Cloud computing is one of the leading buzz terms in the world of IT today. Seemingly every possible solution has been enhanced with the mere addition of the word “cloud”. Cloud computing refers to applications and services offered over the Internet. These services are offered from data centers all over the world, which collectively are referred to as the "cloud." This metaphor represents the intangible, yet universal nature of the Internet. The idea of the "cloud" simplifies the many network connections and computer systems involved in online services. In fact, many network diagrams use the image of a cloud to represent the Internet. This symbolizes the Internet 's broad reach, while simplifying its complexity. Any user with an Internet connection can access the cloud and the services it provides. Since these services are often connected, users can share information between multiple systems and with other users. Examples of this technology include online backup services, social networking services, and personal data services such as Apple 's MobileMe. Cloud computing also includes online applications, such as those offered through Microsoft Online Services. Hardware services, such as redundant servers, mirrored websites, and Internet-based clusters are also examples of cloud computing. ("Technology terms," 2009)…

    • 1605 Words
    • 7 Pages
    Better Essays
  • Good Essays

    NSA paper

    • 739 Words
    • 3 Pages

    The National Security Agency has been collecting the phone records of all U.S. citizens—which numbers have called which other numbers, when, and for how long—in an enormous database. The government says this mass collection is OK because the database is “queried”—i.e., searched—only under court supervision. In theory, this two-tiered approach, with judicial scrutiny applied at the query stage rather than the collection stage, is defensible. But does the judiciary—in this case, the Foreign Intelligence Surveillance Court—really examine the database queries?…

    • 739 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Back in the beginning stages of the War on Terrorism, President Bush enacted the Patriot Act. This allowed the government to spy on citizens, monitoring their activities in order to discern whether or not someone is a terrorist. It brought about changes in law enforcement that allowed agencies to search phones, financial records, etc.…

    • 447 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Technological Advances and Ethical Issues precipitating the passage of the Patriot Act and the Federal Information Security Management Act…

    • 780 Words
    • 4 Pages
    Good Essays
  • Good Essays

    different organs that address security issues both within and outside the borders. The United States of America has different security organs that deal with different security issues. The Department of Homeland Security is one organ of security in America. This department deals with threats against the country that range from border control, aviation security, cyber security and emergency response. In emergency response, the department comes up with various courses of action that help in emergency situations a process called emergency management. Emergency management is an action plan that is formulated to mitigate hazards, control disaster, ensure recovery process goes smoothly and follow up on recovery. These roles of the Department of Homeland…

    • 1865 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Intelligence analysis is an expanding field that encompasses a variety of educational backgrounds and industries. As an intelligence analyst, you piece together information from multiple sources to learn about the activities of organized criminal organizations, serial killers, terrorists, drug lords and other subjects. Intelligence analysts are involved in the acquisition, evaluation, analysis and assessment of secret intelligence. They work primarily for the UK's three intelligence and security agencies and are also employed by the armed forces and police. Earn a Bachelor's Degree. An intelligence analyst is expected to have earned at least a bachelor's degree from an accredited university. Some law enforcement agencies, including the FBI,…

    • 423 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    Digital forensics is not a new phenomenon, therefore, why is it, still to this day, not considered a profession. As mentioned in the article, digital forensics has been around since the 1970s when the government first began to develop tools to investigate web based fraud (Losavio, Seigfried-Spellar, and Sloan, 2016). Social scientists have claimed that due to the progression digital forensics has received, such as, specialized knowledge; specialized training; work that is considered great value; credit emptor relations with clients; a code of ethics; cooperative relations with other members; high autonomy levels; and self regulation, since its original inception, that it is indeed a profession (Losavio, Seigfried-Spellar, and Sloan, 2016).…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Surveys of Justice and SecurityTracy WebbOctober 12, 2009AbstractThere are many differences between the private and public security sector. Private securities have the ability to pick and choose the tasks and duties that are performed. This is one of the main advantages that private policing has over public policing.…

    • 1295 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Essay On Internet Privacy

    • 611 Words
    • 3 Pages

    What does privacy really mean and why do people want it? It’s a fair question to ask, especially when looking at the internet, a global system that connects you to billions of people (Oxforddictionaries.com). There are endless amounts of details you can discover about a particular person on the internet. Some people enjoy the fact that they can access so much about another person with just a click of a button, while others fear it. That is why people take precautions, limiting the amount of access outsiders have to their information, however that does not always work. There are many loop holes in the terms and conditions we agree to on websites which leaves us open to the public in certain ways. There are also many ethical concerns regarding privacy on the internet.…

    • 611 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Defense Mechanisms Paper

    • 1245 Words
    • 5 Pages

    A defense mechanism is a coping skill learned to help deal with stress. Defense mechanisms can be beneficial and harmful to people. When defense mechanisms are used constantly to deal with stress the stress is not being evaluated by a person and can actually make a stressful situation worse. Facing stress head on and using defense mechanisms consciously can sometimes alleviate a stressful situation. Two defense mechanisms I find myself using sometimes are projection and conversion reaction.…

    • 1245 Words
    • 5 Pages
    Good Essays