The Security of Cloud Computing System enabled by Trusted Computing Technology
#1

Abstract
Cloud computing provides people the way to sharedistributed resources and services that belong to differentorganizations or sites. Since cloud computing share distributedresources via the network in the open environment, thus itmakes security problems important for us to develop the cloudcomputing application. In this paper, we pay attention to thesecurity requirements in cloud computing environment. Weproposed a method to build a trusted computing environmentfor cloud computing system by integrating the trustedcomputing platform into cloud computing system. We proposea model system in which cloud computing system is combinedwith trusted computing platform with trusted platform module.In this model, some important security services, includingauthentication, confidentiality and integrity, are provided incloud computing system.Keywords-cloud computing; trusted computing platform;trusted computing; trusted service
I. INTRODUCTION
Since distributed systems and network computing wereused wildly, security has become an urgent problem andwill be more important in the future. In order to improve thework efficiency, the different services are distributed indifferent servers that are distributed in different places. Incontrast to the fast developing of distributed computingtechnologies, people have remained insufficient in the fieldof information security and safety. In recently, a new trendattracts people’s attention. Users from multiple environmenthope use the distributed computing more efficient, just likeusing the electric power. Then, cloud computing hasbecome a new star for this demand. cloud computing isconcerned with the sharing and coordinated use of diverseresources in distributed organizations --- cloud, which isconsisted of different organizes and systems. Cloudcomputing provides a facility that enable large-scalecontrolled sharing and interoperation among resources thatare dispersedly owned and managed. Security is therefore amajor element in any cloud computing infrastructure,because it is necessary to ensure that only authorized accessis permitted and secure behavior is accepted. In a word, allmembers in the cloud and the cloud computingenvironment should be trusted by each other, and themembers that have communication should be trusted byeach other. Trust is the major concern of the consumers andprovider of services that participate in a cloud computingenvironment.Because the cloud computing is composed of differentlocal systems and includes the members from multipleenvironments, therefore the security in cloud is complicate.In one side, the security mechanism should provideguarantees secure enough to the user, on the other side, thesecurity mechanism should not be too complex to put theusers into an inconvenient situation. The openness andflexibility of the computer and popular commercialoperating systems have been important factors supportingtheir widespread adoption. However, that very sameopenness and flexibility have been proved to be a doubleedged sword, because it brings complexity, reduces trustdegree and threat against security. So there should be abalance between the security and the convenience [5]. Thedependable and secure computing includes not only securityand confidentiality, but also reliability, availability, safetyand integrity [10]. Considering these facts, we propose anew way that is conducive to improve the secure anddependable computing in cloud. In our design, we integratethe Trusted Computing Platform (TCP), which is based onTrusted Platform Module (TPM), into the cloud computingsystem. The TCP will be used in authentication,confidentiality and integrity in cloud computingenvironment. The TCP can improve the cloud computingsecurity and will not bring much complexity to users.Because the TCP is based on relatively independenthardware modules, it does not cost too much resource ofCPU, and can improve the performance of processingcryptographic computation. We also design a softwaremiddleware, the Trusted Platform Support Service (TSS),on which the cloud computing application can use easily thesecurity function of TPM.


Download full report
http://ieeexplore.ieeeiel5/5547586/55552...er=5555234
Reply
#2
please put a seminar report on security issues in cloud computing.... this page link does not give the report...it asks for loginHuh ...plz help
Reply
#3


to get information about the topic Cloud Computing full report ,ppt and related topic refer the page link bellow

http://studentbank.in/report-cloud-compu...oject-idea

http://studentbank.in/report-cloud-compu...dea?page=2

http://studentbank.in/report-cloud-computing--5219

http://studentbank.in/report-cloud-computing--4041

http://studentbank.in/report-cloud-compu...final-year

http://studentbank.in/report-amazon-elas...-computing

http://studentbank.in/report-cloud-computing

http://studentbank.in/report-an-introduc...3#pid62503

http://studentbank.in/report-cloud-computing?page=2

http://studentbank.in/report-cloud-computing--13380

http://studentbank.in/report-cloud-compu...219?page=2

http://studentbank.in/report-cloud-compu...041?page=4

http://studentbank.in/report-the-securit...technology
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: cuda computing, ideal computing edinburgh, web application of cloud computing seminar topic ppt file, enhanced data security model for cloud computing, enhanced data security model in cloud computing ppt, er diagram of cloud computing security, mobile computing cdpd technology,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Platform Autonomous Custom Scalable Service using Service Oriented Cloud Computing Ar 1 1,033 15-02-2017, 04:39 PM
Last Post: jaseela123d
  Cloud Computing with Service Oriented Architecture in Business Applications 1 899 15-02-2017, 11:55 AM
Last Post: jaseela123d
  Cloud Computing Security: From Single to Multi-Clouds 1 824 14-02-2017, 04:56 PM
Last Post: jaseela123d
  SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-He 1 896 14-02-2017, 03:49 PM
Last Post: jaseela123d
  The impact of technology on queue management system holax 1 1,410 14-07-2016, 02:39 PM
Last Post: seminar report asees
  Security Analysis of the SASI Protocol computer science topics 2 1,961 21-06-2016, 10:30 PM
Last Post: Guest
  Security system using IP camera mechanical engineering crazy 5 4,340 16-03-2015, 02:52 PM
Last Post: seminar report asees
  projects on cloud computing? shakir_ali 0 1,201 30-10-2014, 01:12 AM
Last Post: shakir_ali
  A PROACTIVE APPROACH TO NETWORK SECURITY nit_cal 1 2,249 19-09-2014, 12:52 AM
Last Post: [email protected]
  Data Security Using Honey Pot System computer science topics 5 6,685 11-09-2014, 07:45 PM
Last Post: erhhk

Forum Jump: