The Study of Network Information System Security Strategy Based on Trusted Cloud Computing

Article Preview

Abstract:

This paper analyzed functions of the network information system based on trusted computing and trusted computing platform based on cloud computing. Raised the propose to expand the application of trusted computing technology to network information system, to meet the needs of cloud computing of trusted computing, trusted cloud computing, implement the trusted cloud computing. In our design, will take the Trusted Computing Platform (TCP) as the basis of cloud computing system, provide some important security functions to ensure the communication and data security.Finally put forward the implement methods.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

400-403

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Dr. Rao Mikkilineni, Vijay Sarathy, Cloud Computing and the Lessons from the Past, the 18th IEEE IWET: Infrasturctures for Colloaborative Enterises, on page(s): 57-62, (2009).

Google Scholar

[2] Balachandra Reddy Kandukuri, Ramacrishna PaturiV, Atanu Rakshi, Cloud Security Issues, 2009 IEEE International Conference on Services Computing, pages(s): 517-520.

Google Scholar

[3] Peter Wayner, Cloud versus cloud – A guided tour of Amazon, Google, AppNexus and GoGrid, InfoWorld, July 21, (2008).

Google Scholar

[4] Glen Bruce, Rob Dempsey, Security in Distributed Computing, Published by Prentice Hall, Copyright Hewlett-Packard Company, (1997).

Google Scholar