Improving the Security of Cloud Computing using Trusted Computing Technology
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2012, Vol 2, Issue 1
Abstract
Cloud Computing is a collection of computers and servers that are publicly accessible via Internet. It is a significantly new idea that influence the power of internet to process, store and share data from a network of remote servers located anywhere in the world. That is a good way to share a many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. This paper analyses some security services in cloud computing environment and a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. Trusted Computing Platform (TCP) model can improve the cloud computing security and will not bring much complexity to users. In this model, some important security services including encryption, authentication, integrity and confidentiality are provided in cloud computing system.
Authors and Affiliations
P. Senthil , N. Boopal , R. Vanathi
Review on Adsorption Refrigeration System
Energy can neither be created nor be destroyed”- first law of thermodynamics. the energy potential of the world is constant , so we have to save the energy as much as possible .as the refrigeration is needed ev...
Topologies in Unstructured Peer To Peer Networks
Abstract: The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. As the peers participating in unstructured networks interconnect randomly, they rely on...
Implementation of Monitoring System for Cloud Computing
: As the benefits of cloud computing have increased, its utilization has been higher, but it has caused overload problems for virtual server. This paper implements the monitoring dashboard of cloud computing in ord...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sensor networks
The multi-hop routing in wireless sensor networks (WSNs) highly vulnerable against identity cheating through replaying routing data. An attacker can uses this drawback to launch various serious or even disturbing a...
Study of the Internal Structure of Electronic Components RAM DDR-2 and Motherboard of Nokia-3120 by Using Neutron Radiography Technique
Neutron radiography technique has been applied in the present study to detect the internal structure of electronic components RAM DDR-2 and Motherboard of Nokia-3120. In present experiment, electronic RAM model: DD...