Research on Cloud Computing Security Based on the Remote Attestation

Article Preview

Abstract:

Cloud computing security has become a key problem of restricting the development of cloud computing, solving the cloud computing security problem has been extremely urgent. At present, it has become a new favorite in the cloud computing security research field that trusted computing is used to solve the cloud computing security, this paper uses remote attestation in trusted computing to solve the cloud computing security problems. In a cloud computing environment, the service provider not only needs to provide reliable components, but also needs to ensure that the computing platform system is reliable. In this paper, in view of the characteristics of the cloud computing platform, these two approaches are consolidated and improved, and a proof method based on the component properties and the system behavior (CPTBA) is put forward.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2657-2664

Citation:

Online since:

June 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Feng Dengguo, Zhang Min, Zhang Yan, Xu Zhen. Study on Cloud Computing Security [J]. Journal of Software, 2011, 22 (1): 71-83(in Chinese)

Google Scholar

[2] Feng Dengguo, QinYu, Wang Dan, Chu Xiaobo. Research on Trusted Computing Technology [J] Journal of Computer Research and Development 2011, 48(8): 1332-1349(in Chinese)

Google Scholar

[3] QinYu, Feng Dengguo. Component Property Based on Remote Attestation [J]. Journal of Software, 2009, 20 (6): 1625-1641.(in Chinese)

DOI: 10.3724/sp.j.1001.2009.03343

Google Scholar

[4] Feng Dengguo, QinYu. Trusted Computing Environment Attestation Method [J]. Chinese Journal of Computers, 2008, 31 (9): 1641-1652.(in Chinese)

Google Scholar

[5] Li Xiaoyong, Zuo Xiaodong, Shen Changxiang. Trustworthiness Attestation for Computing Platform Based on System Behavior [J]. ACTA ELETRONICA SINICA 2007, 6 (7) : 1235-1239(in Chinese)

Google Scholar

[6] Shi Guangyuan, Zhang Jianbiao. Research and Development of Trustworthiness Attestation in Trusted computing [J]. Application Research o f Computer, 2011, 28 (12): 4414-4419(in Chinese)

Google Scholar

[7] Fang Jing, Wu Hao, Bai Songlin. Cloud computing the virtualization security [J]. Telecom science, 2012, 4: 135 -140(in Chinese)

Google Scholar

[8] Yang Jian, Wang Haihang, Wang Jian, Yu Dingguo. Research Review of Cloud Computing Security Issues [J]. Chinese Computer Systems 2012, 33 (3): 472-479(in Chinese)

Google Scholar

[9] Zhang Hui, Xing PeiZheng. Analysis of Information Security in Cloud Computing Environment. [J]. Computer Research and Development, 2011, 21(12): 164-166,171(in Chinese)

Google Scholar

[10] Santos N, Gummadi KP, Rodrigues R. Towards trusted cloud computing. In: Sahu S, ed, USENIX Association Proc. of the Workshop on Hot Topics in Cloud Computing 2009. San Diego, 2009. http://www.usenix.org/events/hotcloud09/tech/full_papers/ santos.pdf

Google Scholar

[11] Wu Jiyi, Shen Qianli, Zhang Jianlin, Shen Zhonghua, Ping Lingdi. Cloud Computing: from Cloud Security to Trustworthy Cloud [J]. Computer Research and Development, 2011, 48 (Supplement): 229-233(in Chinese)

Google Scholar

[12] Chen Jianxun. Hou Fangyong. Li Lei. Research on Trusted Computing [J]. Computer Technology and Development, 2010, 20 (9): 1-4, 9(in Chinese)

Google Scholar

[13] Yu Puyang. Kang Guosheng. Research and Development on Trusted Computing [J]. Computer Technology and Development, 2011, 21 (8): 233-236(in Chinese)

Google Scholar