A user-specific trusted virtual environment for cloud computing

被引:3
|
作者
机构
[1] He, Rongyu
[2] Wu, Shaojie
[3] Jiang, Lu
来源
He, R. | 1905年 / Asian Network for Scientific Information卷 / 12期
关键词
Cloud computing infrastructures - Computing model - Configurability - Execution environments - Security settings - Sensitive application - Trust transitive - Trusted computing technology;
D O I
10.3923/itj.2013.1905.1913
中图分类号
学科分类号
摘要
Cloud computing is a new computing model that provides users multiple isolated execution environments, usually referred to as Virtual Machine (VMs), on a single host. But the model that all users' data place in the cloud brings a significant level of risk on the privacy, for example, the data in the cloud could be tampered or abused by malicious customers. So, the trustworthy of the VMs becomes a significant hurdle for mainstream cloud adoption, especially for critical or sensitive applications. In this study, we apply Trusted Computing technology into the Cloud computing infrastructure, design a multi-source trust chain model, a Tree-like Trust Chain for VMs (TTCVM), which provides VMs with two trust sources, trust from the host and trust from the user. A user-specific virtual TPM, μTPM, is proposed using the TPM virtualization which aggregates the two trusts and forwards them to the user VM. Formal analysis demonstrates that TTCVM provides users the visibility and configurability into security settings of his execution environment. © 2031 Asian Network for Scientific Information.
引用
收藏
相关论文
共 50 条
  • [31] Evaluating the importance of user-specific profiling
    Wang, Z
    Rubin, N
    PROCEEDINGS OF THE 2ND USENIX WINDOWS NT SYMPOSIUM, 1998, : 21 - 30
  • [32] Exploring the influence of a user-specific explainable virtual advisor on health behaviour change intentions
    Abdulrahman, Amal
    Richards, Deborah
    Bilgin, Ayse Aysin
    AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS, 2022, 36 (01)
  • [33] Semi-dynamic User-Specific Clustering for Downlink Cloud Radio Access Network
    Liu, Dong
    Han, Shengqian
    Yang, Chenyang
    Zhang, Qian
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (04) : 2063 - 2077
  • [34] Exploring the influence of a user-specific explainable virtual advisor on health behaviour change intentions
    Amal Abdulrahman
    Deborah Richards
    Ayse Aysin Bilgin
    Autonomous Agents and Multi-Agent Systems, 2022, 36
  • [35] Cloud Task and Virtual Machine Allocation Strategy in Cloud Computing Environment
    Xu, Xing
    Hu, Hao
    Hu, Na
    Ying, Weiqin
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 113 - 120
  • [36] Configuration and Optimization of Virtual Business in Cloud Computing Environment
    Sun, Hongjun
    Huang, Shuangxi
    Fan, Yushun
    Su, Wei
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 39 - 46
  • [37] Optimization of Virtual Resources Allocation in Cloud Computing Environment
    Akintoye, Samson B.
    Bagula, Antoine
    2017 IEEE AFRICON, 2017, : 873 - 880
  • [38] Research on Multi-QoS and Trusted Task Scheduling in Cloud Computing Environment
    Li, Fufang
    Xie, Dongqing
    Gao, Ying
    Xie, Guowen
    Guo, Qiuye
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 1892 - +
  • [39] Trusted Computing Strengthens Cloud Authentication
    Ghazizadeh, Eghbal
    Zamani, Mazdak
    Ab Manan, Jamalul-Lail
    Alizadeh, Mojtaba
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [40] Toward a Trusted framework for Cloud Computing
    Toumi, Hicham
    Talea, Mohamed
    Sabiri, Khadija
    Eddaoui, Ahmed
    2015 INTERNATIONAL CONFERENCE ON CLOUD TECHNOLOGIES AND APPLICATIONS (CLOUDTECH 15), 2015, : 361 - 366