A user-specific trusted virtual environment for cloud computing

被引:3
|
作者
机构
[1] He, Rongyu
[2] Wu, Shaojie
[3] Jiang, Lu
来源
He, R. | 1905年 / Asian Network for Scientific Information卷 / 12期
关键词
Cloud computing infrastructures - Computing model - Configurability - Execution environments - Security settings - Sensitive application - Trust transitive - Trusted computing technology;
D O I
10.3923/itj.2013.1905.1913
中图分类号
学科分类号
摘要
Cloud computing is a new computing model that provides users multiple isolated execution environments, usually referred to as Virtual Machine (VMs), on a single host. But the model that all users' data place in the cloud brings a significant level of risk on the privacy, for example, the data in the cloud could be tampered or abused by malicious customers. So, the trustworthy of the VMs becomes a significant hurdle for mainstream cloud adoption, especially for critical or sensitive applications. In this study, we apply Trusted Computing technology into the Cloud computing infrastructure, design a multi-source trust chain model, a Tree-like Trust Chain for VMs (TTCVM), which provides VMs with two trust sources, trust from the host and trust from the user. A user-specific virtual TPM, μTPM, is proposed using the TPM virtualization which aggregates the two trusts and forwards them to the user VM. Formal analysis demonstrates that TTCVM provides users the visibility and configurability into security settings of his execution environment. © 2031 Asian Network for Scientific Information.
引用
收藏
相关论文
共 50 条
  • [1] Application of Trusted Virtual Environment Module in Cloud Computing
    Hu Yu
    SUSTAINABLE DEVELOPMENT OF NATURAL RESOURCES, PTS 1-3, 2013, 616-618 : 2196 - 2199
  • [2] Introducing the Trusted Virtual Environment Module: A New Mechanism for Rooting Trust in Cloud Computing
    Krautheim, F. John
    Phatak, Dhananjay S.
    Sherman, Alan T.
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 211 - 227
  • [3] Trusted virtual machine management model for cloud computing
    Zhou, Zhen-Ji
    Wu, Li-Fa
    Hong, Zheng
    Lai, Hai-Guang
    Zheng, Cheng-Hui
    1600, Editorial Board of Journal on Communications (35): : 94 - 105
  • [4] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665
  • [5] Cryptographic Cloud Computing Environment as a More Trusted Communication Environment
    Jasim, Omer K.
    Abbas, Safia
    El-Horbaty, El-Sayed M.
    Salem, Abdel-Badeeh M.
    INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2014, 6 (02) : 38 - 51
  • [6] A User Authentication Scheme Based on Trusted Platform for Cloud Computing
    Mo, Jiaqing
    Hu, Zhongwang
    Lin, Yuhua
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 122 - 130
  • [7] A trusted group signature architecture in virtual computing environment
    Zou, Deqing
    Li, Yunfa
    Wu, Song
    Qiang, Weizhong
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 73 - 85
  • [8] Prosthesis-User-in-the-Loop: A User-Specific Biomechanical Modeling and Simulation Environment
    Wojtusch, J.
    Beckerle, P.
    Christ, O.
    Wolff, K.
    von Stryk, O.
    Rinderknecht, S.
    Vogt, J.
    2012 ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY (EMBC), 2012, : 4181 - 4184
  • [9] Virtual screening in the cloud computing environment
    Cooper, Aaron
    Koebel, Mathew
    Schmadeke, Grant
    Sirimulla, Suman
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2016, 251
  • [10] Trusted computing based open environment user authentication model
    Cyber Security Cluster, MIMOS Berhad, Technology Park Malaysia, Kuala Lumpur, Malaysia
    不详
    ICACTE - Int. Conf. Adv. Comput. Theory Eng., Proc., (V6487-V6491):