IaaS Architecture based on Trusted Computing

被引:0
|
作者
Zhang Wenbo [1 ]
Bao Zhenshan [1 ]
Li Jian [1 ]
Duan Lijuan [1 ]
机构
[1] Beijing Univ Technol, Dept Comp Sci, Beijing 100124, Peoples R China
关键词
Infrastructure as a Service (IaaS); Trusted Computing; Cloud Computing;
D O I
10.4028/www.scientific.net/AMM.513-517.399
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The dynamic, heterogeneity and complexity make cloud platform much less credible. As a vital level in cloud computing platform, IaaS is very important to improve the trustworthy degree of cloud. In this paper, we explore this area, we identify the fundamental function provided by the trusted IaaS, we identify the indispensable tasks completed by the trusted IaaS, and then we propose a foundation framework for establishing trusted IaaS. Finally, we gave a conclusion and the direction of future works.
引用
收藏
页码:399 / 402
页数:4
相关论文
共 50 条
  • [21] A secure bootstrap based on trusted computing
    Gu, Junkai
    Ji, Weiyong
    [J]. 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 502 - 504
  • [22] A Trusted Mobile Payment Environment Based on Trusted Computing and Virtualization Technology
    WANG Juan
    LIN Wutao
    LI Haoyu
    DU Bianxia
    MENG Ke
    WANG Jiang
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 379 - 384
  • [23] The research of Trusted Computing based on the model of trusted Meta data of BSCM
    Zhong, Liu
    [J]. 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 941 - 945
  • [24] Identity anonymity for grid computing coordination based on trusted computing
    Shi, Zhiguo
    He, Yeping
    Huai, Xiaoyong
    Zhang, Hong
    [J]. SIXTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING, PROCEEDINGS, 2007, : 403 - +
  • [25] An Integrated Architecture for Trusted Computing for Java']Java enabled Embedded Devices
    Dietrich, Kurt
    [J]. STC'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SCALABLE TRUSTED COMPUTING, 2007, : 2 - 6
  • [26] PISTIS: Trusted Computing Architecture for Low-end Embedded Systems
    Grisafi, Michele
    Ammar, Mahmoud
    Roveri, Marco
    Crispo, Bruno
    [J]. PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3843 - 3860
  • [27] Security strategy of DRM based on trusted computing
    Yan, Jianhong
    Peng, Xinguang
    [J]. Journal of Computational Information Systems, 2011, 7 (09): : 3226 - 3234
  • [28] A trusted computing model based on code authorization
    Wei, Guoheng
    Zhou, Xueguang
    Zhang, Huanguo
    [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 495 - +
  • [29] Improved Biba model based on trusted computing
    Liu, Gang
    Zhang, Jing
    Liu, Jinhui
    Zhang, Yuan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (16) : 2793 - 2797
  • [30] Study on Access Control Based on Trusted Computing
    Ma, Xinqiang
    Huang, Yi
    Bo Lv
    [J]. MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +