A user-specific trusted virtual environment for cloud computing

被引:3
|
作者
机构
[1] He, Rongyu
[2] Wu, Shaojie
[3] Jiang, Lu
来源
He, R. | 1905年 / Asian Network for Scientific Information卷 / 12期
关键词
Cloud computing infrastructures - Computing model - Configurability - Execution environments - Security settings - Sensitive application - Trust transitive - Trusted computing technology;
D O I
10.3923/itj.2013.1905.1913
中图分类号
学科分类号
摘要
Cloud computing is a new computing model that provides users multiple isolated execution environments, usually referred to as Virtual Machine (VMs), on a single host. But the model that all users' data place in the cloud brings a significant level of risk on the privacy, for example, the data in the cloud could be tampered or abused by malicious customers. So, the trustworthy of the VMs becomes a significant hurdle for mainstream cloud adoption, especially for critical or sensitive applications. In this study, we apply Trusted Computing technology into the Cloud computing infrastructure, design a multi-source trust chain model, a Tree-like Trust Chain for VMs (TTCVM), which provides VMs with two trust sources, trust from the host and trust from the user. A user-specific virtual TPM, μTPM, is proposed using the TPM virtualization which aggregates the two trusts and forwards them to the user VM. Formal analysis demonstrates that TTCVM provides users the visibility and configurability into security settings of his execution environment. © 2031 Asian Network for Scientific Information.
引用
收藏
相关论文
共 50 条
  • [11] TTS: A Study of Trusted Tenant System in Cloud Computing Environment
    Kunal, Kundan
    Malik, L. G.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [12] User-Specific Perspectives on Ontologies
    Brochhausen, Mathias
    Slaughter, Laura
    Stenzhorn, Holger
    Graf, Norbert
    MEDICAL AND CARE COMPUNETICS 6, 2010, 156 : 114 - 121
  • [13] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    TsinghuaScienceandTechnology, 2019, 24 (05) : 520 - 534
  • [14] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [15] Cloud Computing: Cloud Security to Trusted Cloud
    Wu Jiyi
    Shen Qianli
    Zhang Jianlin
    Xie Qi
    NEW TRENDS AND APPLICATIONS OF COMPUTER-AIDED MATERIAL AND ENGINEERING, 2011, 186 : 596 - 600
  • [16] Virtual Machine Allocation in Cloud Computing Environment
    Ezugwu, Absalom E.
    Buhari, Seyed M.
    Junaidu, Sahalu B.
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2013, 3 (02) : 47 - 60
  • [17] Virtual Desktop Environment on Cloud Computing Platform
    Fuzi, Mohd Faris Mohd
    Hamid, Ros Syamsul
    Ahmad, Muhammad Akram
    2014 IEEE 5TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC), 2014, : 80 - 84
  • [18] Virtual network Routing in Cloud Computing Environment
    Ponnusamy, P. Priya
    Abinaya, S.
    2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [19] Resources Scheduling in Virtual Environment of Cloud Computing
    El Mahoti, Yassine
    Aknin, Noura
    Amjad, Souad
    El Kadiri, Kamal Eddine
    PROCEEDINGS OF THE MEDITERRANEAN CONFERENCE ON INFORMATION & COMMUNICATION TECHNOLOGIES 2015 (MEDCT 2015), VOL 2, 2016, 381 : 613 - 618
  • [20] Experiences in Trusted Cloud Computing
    Oliver, Ian
    Holtmanns, Silke
    Miche, Yoan
    Lal, Shankar
    Hippelainen, Leo
    Kalliola, Aapo
    Ravidas, Sowmya
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 19 - 30