Beruflich Dokumente
Kultur Dokumente
RESEARCH ARTICLE
OPEN ACCESS
ABSTRACT
Cloud Computing may be an assortment of computers and servers that area unit in public accessible
via net. Its a considerably new concept that influence the facility of net to method, store and share information from
a network of remote servers settled anyplace within the world. That is a good thanks to share a several types
of distributed
resources, however it conjointly makes
security
issues additional complicate
and additional necessary for users than before. This paper analyses some security services in cloud
computing surroundings and a way to make a trusty computing surroundings for cloud ADP system by group
action the trusty computing platform into cloud ADP system. Trusty Computing Platform (TCP) model will improve
the cloud computing security and cannot bring a lot of quality to users. During this model, some necessary security
services as well as coding, authentication, integrity and confidentiality area unit provided in cloud ADP system.
Keywords :- Cloud Computing, Trusty Computing, Trusty Computing Platform, TCPA, Trusty Security Services
I. INTRODUCTION
www.ijetajournal.org
Page 11
International Journal of Engineering Trends and Applications (IJETA) Volume 3 Issue 1, Jan -Feb 2016
2.2 Trusted Computing
The trusty Computing cluster (TCG) planned a
group of
hardware
and software
package
technologies
to modify the
development of trusty platforms.
The trusty Computing Platform (TCP) are utilized
in authentication, confidentiality and integrity in
cloud
computing
surroundings.
2.3 Trusted Computing Security Services
Trusted Computing Platform operates through a
mixture of software
package and
hardware.TCP
provides following security services.
Authenticated Boot
A documented boot
service wont
to monitors
what software software package is shoed on the pc
and conjointly tell that software is
running. Every web
site within
the cloud ADP
system can record
the
visitors data. Therefore by victimization the TCP me
chanism in cloud computing, the trace of
participants is
often renowned by
the
cloud
computing trace mechanism.
Encryption
Encryption may be a method of translating the cipher
text into plaint text. This perform lets information be
encrypted in such the simplest way that it are
often decrypted solely by a particular machine, ands
long as that machine is in a very sure configuration.
The coding is another major mechanism in our style.
This service is constructed by a mixture of hardware
and software package application.
Authentication
Authentication is that the act of confirming the
reality of AN attribute of an information or entity.
Authentication provides the access permission
to solely the approved users
and
restricts the
unauthorized users.
Confidentiality
The
information
belongs
to completely
different house owners within the cloud computing
resources ought to be hospitable the trusty objects.
Unauthorized individuals or different entities ought
to be out from that data.
Integrity
In integrity cannot modify the originality of the
knowledge therefore integrity
is considered the
honesty and honesties or exactness of ones actions.
Integrity is
often considered the
alternative of
III. DESIGN
The design was designed to comprehend a large type
of tools and technologies. It authentication, blocks
the access of unsafe endpoints and coordinates
security devices provides robust user across the
enterprise.
The trusty Computing
technology is
employed to
boost the
security of cloud ADP system.
www.ijetajournal.org
Page 12
International Journal of Engineering Trends and Applications (IJETA) Volume 3 Issue 1, Jan -Feb 2016
IV. TRUSTED
TECHNOLOGY
COMPUTING
www.ijetajournal.org
Page 13
International Journal of Engineering Trends and Applications (IJETA) Volume 3 Issue 1, Jan -Feb 2016
layer wants. The most issue with the "Cloud" is
coupled to the responsiveness of data. In a
cloud, every people are totally right to be anxious
concerning the
confidentiality and
therefore
the accessibility of the knowledge.
4.7 Trusted Computing Benefits
Trusted
Computing
technology
creates
a
safer surroundings in cloud computing. It provides
Safer
Remote Access
through a mixture of
mechanism
and
User
Authentication. Trusty computing
Protects
against information outpouring by confirmation of
platform integrity before coding and coding. The
Hardware
Protection
for coding and
Authentication secret
is employed
by information (Files) and Communications (Email,
Network Access). The Hardware Protection for one
by one place able data like User Ids and Passwords.
Lowest value Hardware Security Solution: No Token
to Distribute or Lose, No Peripheral to shop
for or infix, No Limit to variety of Keys, Files or IDs
Protected.
Trusted
Computing defend Business important information an
d Systems.
Secure Authentication and powerful Protection of
User IDs.
Establish robust Machine Identity and Integrity.
Ensure regulative Compliance with HardwareBased Security.
Trusted Computing scale back the
overall value of possession through "Built In"
Protection.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Balachandra
Reddy
Kandukuri,
Ramacrishna Paturiv, Atanu Rakshi, Cloud
Security
Issues,IEEE
International
Conference
on
Services
Computing,
pages(s):517-520, 2009.
CloudComputing:http://en.wikipedia.org/wi
ki/Cloud_co
mputing
,
Accessed:
28/07/2011.
Cloud
Computing, http://www.technopulse.com/ Cloud Computing for Beginners,
Accessed: 28/07/2011.
Cloud Security Alliance: Security Guidance
Critical Areas of Focus in Cloud
Computing,
http://www.cloudsecurityalliance.org/guidan
ce/csaguide. Pdf. April 2009.
Dr.Rao Mikkilineni, Vijay Sarathy, Cloud
Computing and the Lessons from the Past,
the 18th IEEE international Workshops on
Enabling Technologies: Infrasturctures for
Colloaborative Enterises, on page(s):57-62,
2009.
Frank E. Gillett, Future View: The new
technology ecosystems of cloud, cloud
services and cloud computing Forrester
Report, August 2008.
Glen Bruce, Rob Dempsey, "Security in
Distributed Computing", Published by
Prentice Hall, Copyright Hewlett-Packard
Company, 1997.
www.ijetajournal.org
Page 14
International Journal of Engineering Trends and Applications (IJETA) Volume 3 Issue 1, Jan -Feb 2016
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
ISO/IEC. Information
technology-Open
Systems Interconnection- Evaluation criteria
for information tech-nology, Standard
ISO/IEC 15408.1999.
Jason Reid Juan M. Gonzalez Nieto Ed
Dawson, "Privacy and Trusted Computing",
Proceedings of the 14th International
Workshop on Database and Expert Systems
Applications, IEEE, 2003.
Martn Abadi, "Logic in Access Control" ,
Proceedings
of the18th Annual IEEE
Symposium on Logic in Computer Science
(LICS'03), 2003.
Peter Wayner, Cloud versus cloud A
guided tour of Amazon, Google, AppNexus
and GoGrid, InfoWorld, July 21, 2008.
Ronald
Toegl,
Thomas
Winkler,
Mohammad Nauman, Theodore Hong,
"Towards Platform-Independent Trusted
Computing",2009.
Tal Garfinkel, Mendel Rosenblum, and Dan
Boneh,
"Flexible OS Support and
Applications for Trusted Computing", the
9th Workshop on Hot Topics in Operating
Systems (HotOS IX), USENIX, 2003.
Trusted Computing Group (TCG), "TCG
Specification
Architecture
Overview
Specification Revision 1.2", April 28, 2004.
Trusted
computing
group:
http://www.trustedcomputinggroup.org. Acc
essed: 28/07/2011.
Trusted
computing
Technology
:
http://en.wikipedia.org/wiki/Trusted_Compu
ting. Accessed: 28/07/2011.
Trusted computing : http://www.wave.com.
Accessed: 30/07/2011.
Zhidong Shen, Qiang Tong, The Security
of Cloud Computing System enabled by
Trusted
Computing
Technology,
Proceedings of the 2nd International
Conference on Signal Processing Systems
(ICSPS), 2010.
www.ijetajournal.org
Page 15