Technology
Zhidong Shen
International School of Software,
Wuhan University,
Wuhan, China, 430079 zhidongshen@163.com Qiang Tong
School of Software,
Northeastern University,
Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment. We proposed a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. We propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module.
In this model, some important security services, including authentication, confidentiality and integrity, are provided in cloud computing system.
Keywords-cloud computing; trusted computing platform; trusted computing; trusted service
I. INTRODUCTION
Since distributed systems and network computing were used wildly, security has become an urgent problem and will be more important in the future. In order to improve the work efficiency, the different services are distributed in different servers that are distributed in different places. In contrast to the fast developing of distributed computing technologies, people have remained insufficient in the field of information security and safety. In recently, a new trend attracts people’s attention. Users from multiple environment hope use the distributed computing more efficient, just like using the electric power. Then, cloud computing has become a new star for this demand. cloud computing is
References: Enabling Technologies: Infrasturctures for Colloaborative Enterises, on page(s):57-62, 2009 [2] Balachandra Reddy Kandukuri, Ramacrishna PaturiV, Atanu Rakshi, “Cloud Security Issues”, 2009 IEEE International Conference on [3] Peter Wayner, “Cloud versus cloud – A guided tour of Amazon, Google, AppNexus and GoGrid”, InfoWorld, July 21, 2008 Database and Expert Systems Applications, IEEE, 2003. [6] ISO/IEC. Information technology - Open Systems Interconnection - Evaluation criteria for information tech-nology, 1999 [8] Trusted Computing Group (TCG), "TCG Specification Architecture Overview Specification Revision 1.2", April 28, 2004. on Hot Topics in Operating Systems (HotOS IX), USENIX, 2003. Secure Computing”, IEEE transactions on dependable and secure computing, vol.1, No.1, January-March, 2004.