Improving the Security of Cloud Computing using Trusted Computing Technology

Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2012, Vol 2, Issue 1

Abstract

Cloud Computing is a collection of computers and servers that are publicly accessible via Internet. It is a significantly new idea that influence the power of internet to process, store and share data from a network of remote servers located anywhere in the world. That is a good way to share a many kinds of distributed resources, but it also makes security problems more complicate and more important for users than before. This paper analyses some security services in cloud computing environment and a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing system. Trusted Computing Platform (TCP) model can improve the cloud computing security and will not bring much complexity to users. In this model, some important security services including encryption, authentication, integrity and confidentiality are provided in cloud computing system.

Authors and Affiliations

P. Senthil , N. Boopal , R. Vanathi

Keywords

Related Articles

 Review on Adsorption Refrigeration System

 Energy can neither be created nor be destroyed”- first law of thermodynamics. the energy potential of the world is constant , so we have to save the energy as much as possible .as the refrigeration is needed ev...

 Topologies in Unstructured Peer To Peer Networks

 Abstract: The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. As the peers participating in unstructured networks interconnect randomly, they rely on...

 Implementation of Monitoring System for Cloud Computing

 : As the benefits of cloud computing have increased, its utilization has been higher, but it has caused overload problems for virtual server. This paper implements the monitoring dashboard of cloud computing in ord...

 In Multi-Hop Routing identifying trusted paths through TARF in Wireless sensor networks

 The multi-hop routing in wireless sensor networks (WSNs) highly vulnerable against identity cheating through replaying routing data. An attacker can uses this drawback to launch various serious or even disturbing a...

 Study of the Internal Structure of Electronic Components RAM DDR-2 and Motherboard of Nokia-3120 by Using Neutron Radiography Technique

Neutron radiography technique has been applied in the present study to detect the internal structure of  electronic components RAM DDR-2 and Motherboard of Nokia-3120. In present experiment, electronic RAM model: DD...

Download PDF file
  • EP ID EP147525
  • DOI -
  • Views 102
  • Downloads 0

How To Cite

P. Senthil, N. Boopal, R. Vanathi (2012). Improving the Security of Cloud Computing using Trusted Computing Technology. International Journal of Modern Engineering Research (IJMER), 2(1), 320-325. https://europub.co.uk/articles/-A-147525