A Trusted-based Cloud Computing Virtual Storage System and Key Technologies

被引:1
|
作者
Wu, K. H. [1 ]
Chen, L. [1 ]
Li, Yi [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
关键词
trusted; Cloud Computing; virtual storage; cloud storage; encryption; authentication; MANAGEMENT;
D O I
10.15837/ijccc.2015.4.1992
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of Cloud Computing, people become incresingly concern about security problems, especially the data security, which has become the biggest obstacle for the development of Cloud Computing. In order to protect confidentiality and integrity of user data in Cloud Computing, this paper firstly studies the relevant research works in fields of trusted computing and Cloud Computing data protection and secondly introduces the concept of trusted into Cloud Computing data protection, presents the concept of Trusted Virtual Block Storage Device (TVBSD) and designs the Trusted Cloud Computing Virtual Storage System (TCCVSS). And then, the key technologies such as isolation, block device encryption and two-way authentication are expounded in this paper. Finally, the result of experiments shows that the system and the related technologies can not only effectively ensure the security of user data, but also control the consequent performance overhead in a proper range.
引用
下载
收藏
页码:579 / 592
页数:14
相关论文
共 50 条
  • [1] A Way of Key Management in Cloud Storage Based on Trusted Computing
    Yang, Xin
    Shen, Qingni
    Yang, Yahui
    Qing, Sihan
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 135 - 145
  • [2] Key Technologies Research of Distributed Storage Based on Cloud Computing
    Shan, Shaolong
    Wu, Dongling
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCES, MACHINERY, MATERIALS AND ENERGY (ICISMME 2015), 2015, 126 : 1966 - 1969
  • [3] Key technologies of distributed storage for cloud computing
    Wang, Yi-Jie
    Sun, Wei-Dong
    Zhou, Song
    Pei, Xiao-Qiang
    Li, Xiao-Yong
    Ruan Jian Xue Bao/Journal of Software, 2012, 23 (04): : 962 - 986
  • [4] Study of Smart Home system based on Cloud Computing and the key technologies
    Lin, Yuan
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 968 - 972
  • [5] Research on Key Technologies of Distributed Storage in Cloud Computing Environment
    Tao, Liu
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2016), 2016, 50 : 194 - 197
  • [6] Key Technologies in Cloud Computing
    Divya, K.
    Jeyalatha, S.
    2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), 2012, : 196 - 199
  • [7] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    Tsinghua Science and Technology, 2019, 24 (05) : 520 - 534
  • [8] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [9] Research of key management based on trusted module for cloud storage user
    Zhao, Bo
    Li, Yifan
    Milan, Heinayati
    Fei, Yongkang
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (06): : 25 - 31
  • [10] Trusted virtual machine management model for cloud computing
    Zhou, Zhen-Ji
    Wu, Li-Fa
    Hong, Zheng
    Lai, Hai-Guang
    Zheng, Cheng-Hui
    1600, Editorial Board of Journal on Communications (35): : 94 - 105