IaaS Architecture based on Trusted Computing

被引:0
|
作者
Zhang Wenbo [1 ]
Bao Zhenshan [1 ]
Li Jian [1 ]
Duan Lijuan [1 ]
机构
[1] Beijing Univ Technol, Dept Comp Sci, Beijing 100124, Peoples R China
关键词
Infrastructure as a Service (IaaS); Trusted Computing; Cloud Computing;
D O I
10.4028/www.scientific.net/AMM.513-517.399
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The dynamic, heterogeneity and complexity make cloud platform much less credible. As a vital level in cloud computing platform, IaaS is very important to improve the trustworthy degree of cloud. In this paper, we explore this area, we identify the fundamental function provided by the trusted IaaS, we identify the indispensable tasks completed by the trusted IaaS, and then we propose a foundation framework for establishing trusted IaaS. Finally, we gave a conclusion and the direction of future works.
引用
收藏
页码:399 / 402
页数:4
相关论文
共 50 条
  • [1] Architectural Design of Trusted Platform for IaaS Cloud Computing
    Kashif, Ubaidullah Alias
    Memon, Zulfiqar Ali
    Siddiqui, Shafaq
    Balouch, Abdul Rasheed
    Batra, Rakhi
    [J]. INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (02) : 47 - 65
  • [3] Design and implementation of trusted boot based on a new trusted computing dual-architecture
    Zheng, Chenming
    Li, Jun
    Yao, Xuanxia
    [J]. COMPUTERS & SECURITY, 2023, 127
  • [4] A Trusted Computing Architecture for Health Care
    Rasheed, Amar A.
    [J]. 2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 46 - 50
  • [5] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [6] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 13 - 16
  • [7] A Trusted Computing Architecture for Critical Infrastructure Protection
    Burmester, Mike
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 64 - 69
  • [8] An Active Defence Architecture for Industrial Control System based on Trusted Computing 3.0
    Yang Weiyong
    Tao Hongzhu
    Liu Wei
    Wang Jingpei
    Wei Xingshen
    Wang Haiqing
    Huang Hao
    [J]. 2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 2080 - 2085
  • [9] Embedded Trusted Computing Environment Build Based on QEMU Virtual Machine Architecture
    Zhang Lili
    Kong Xiangying
    [J]. 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 193 - 196
  • [10] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509