A user-specific trusted virtual environment for cloud computing

被引:3
|
作者
机构
[1] He, Rongyu
[2] Wu, Shaojie
[3] Jiang, Lu
来源
He, R. | 1905年 / Asian Network for Scientific Information卷 / 12期
关键词
Cloud computing infrastructures - Computing model - Configurability - Execution environments - Security settings - Sensitive application - Trust transitive - Trusted computing technology;
D O I
10.3923/itj.2013.1905.1913
中图分类号
学科分类号
摘要
Cloud computing is a new computing model that provides users multiple isolated execution environments, usually referred to as Virtual Machine (VMs), on a single host. But the model that all users' data place in the cloud brings a significant level of risk on the privacy, for example, the data in the cloud could be tampered or abused by malicious customers. So, the trustworthy of the VMs becomes a significant hurdle for mainstream cloud adoption, especially for critical or sensitive applications. In this study, we apply Trusted Computing technology into the Cloud computing infrastructure, design a multi-source trust chain model, a Tree-like Trust Chain for VMs (TTCVM), which provides VMs with two trust sources, trust from the host and trust from the user. A user-specific virtual TPM, μTPM, is proposed using the TPM virtualization which aggregates the two trusts and forwards them to the user VM. Formal analysis demonstrates that TTCVM provides users the visibility and configurability into security settings of his execution environment. © 2031 Asian Network for Scientific Information.
引用
收藏
相关论文
共 50 条
  • [41] Embedded Trusted Computing Environment Build Based on QEMU Virtual Machine Architecture
    Zhang Lili
    Kong Xiangying
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 193 - 196
  • [42] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [43] User-Specific Parameterization of Process Monitoring Systems
    B. Denkena
    H. Klemme
    J. Becker
    H. Blech
    Production Engineering, 2022, 16 : 735 - 742
  • [44] Learning user-specific parameters in a multibiometric system
    Jain, AK
    Ross, A
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL I, PROCEEDINGS, 2002, : 57 - 60
  • [45] Exploring User-Specific Information in Music Retrieval
    Cheng, Zhiyong
    Shen, Jialie
    Nie, Liqiang
    Chua, Tat-Seng
    Kankanhalli, Mohan
    SIGIR'17: PROCEEDINGS OF THE 40TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2017, : 655 - 664
  • [46] Recommendations for the user-specific enhancement of flood maps
    Meyer, V.
    Kuhlicke, C.
    Luther, J.
    Fuchs, S.
    Priest, S.
    Dorner, W.
    Serrhini, K.
    Pardoe, J.
    McCarthy, S.
    Seidel, J.
    Palka, G.
    Unnerstall, H.
    Viavattene, C.
    Scheuer, S.
    NATURAL HAZARDS AND EARTH SYSTEM SCIENCES, 2012, 12 (05) : 1701 - 1716
  • [47] Accurate detection of user interest data in cloud computing environment
    Qiang Yu
    Qi Liu
    Cluster Computing, 2019, 22 : 1169 - 1178
  • [48] User Privacy Issues in Eucalyptus: A Private Cloud Computing Environment
    Waqar, Adeela
    Raza, Asad
    Abbas, Haider
    TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 927 - 932
  • [49] A User-Based Trust Model for Cloud Computing Environment
    Saeed, Othman
    Shaikh, Riaz Ahmed
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (03) : 337 - 346
  • [50] Accurate detection of user interest data in cloud computing environment
    Yu, Qiang
    Liu, Qi
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1169 - 1178