IaaS Architecture based on Trusted Computing

被引:0
|
作者
Zhang Wenbo [1 ]
Bao Zhenshan [1 ]
Li Jian [1 ]
Duan Lijuan [1 ]
机构
[1] Beijing Univ Technol, Dept Comp Sci, Beijing 100124, Peoples R China
来源
APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY | 2014年 / 513-517卷
关键词
Infrastructure as a Service (IaaS); Trusted Computing; Cloud Computing;
D O I
10.4028/www.scientific.net/AMM.513-517.399
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The dynamic, heterogeneity and complexity make cloud platform much less credible. As a vital level in cloud computing platform, IaaS is very important to improve the trustworthy degree of cloud. In this paper, we explore this area, we identify the fundamental function provided by the trusted IaaS, we identify the indispensable tasks completed by the trusted IaaS, and then we propose a foundation framework for establishing trusted IaaS. Finally, we gave a conclusion and the direction of future works.
引用
收藏
页码:399 / 402
页数:4
相关论文
共 50 条
  • [41] TProv: Towards a Trusted Provenance-Aware Service Based on Trusted Computing
    Luo, Wu
    Ruan, Anbang
    Shen, Qingni
    Wu, Zhonghai
    WEB SERVICES - ICWS 2018, 2018, 10966 : 67 - 83
  • [42] Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
    Kim, Mooseop
    Ryou, Jaecheol
    Jun, Sungik
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 240 - +
  • [43] Identity Matrix: Architecture Framework for Trusted Cloud Computing through Cloud Intellect
    Shafqat, Sarah
    Khan, Muhammad Naeem Ahmed
    Riaz, Naveed
    Khan, Khalid
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (04): : 643 - 651
  • [44] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
  • [45] Trusted computing based user authentication for mobile equipment
    Zheng, Yu
    He, Da-Ke
    He, Ming-Xing
    Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (08): : 1255 - 1264
  • [46] Distributed Trusted Computing for Blockchain-Based Crowdsourcing
    Liang, Yihuai
    Li, Yan
    Shin, Byeong-Seok
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 68 (03): : 2825 - 2842
  • [47] Research on Trust Model Based on Behavior and Trusted Computing
    Gu Yue-sheng
    Chen Jun
    Wang Yan-rong
    PROGRESS IN MEASUREMENT AND TESTING, PTS 1 AND 2, 2010, 108-111 : 1259 - 1263
  • [48] Analysis and Research of Remote Attestation Based on Trusted Computing
    Guo, Jiaming
    Wei, Jiang
    2013 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL MANUFACTURING AND AUTOMATION (ICDMA), 2013, : 192 - 195
  • [49] Privacy and trusted computing
    Reid, J
    Nieto, JMG
    Dawson, E
    Okamoto, E
    14TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2003, : 383 - 388
  • [50] PKI Mesh Trust Model Based on Trusted Computing
    Liu, Changping
    Feng, Yong
    Fan, Mingyu
    Wang, Guangwei
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1401 - 1405