A Paper on Security in Cloud Computing
International School of Software,
Wuhan, China, 430079 email@example.com Qiang Tong
School of Software,
Shenyang, China, 110004 firstname.lastname@example.org Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment. We proposed a method to …show more content…
Because the TCP is based on relatively independent hardware modules, it does not cost too much resource of
CPU, and can improve the performance of processing cryptographic computation. We also design a software middleware, the Trusted Platform Support Service (TSS), on which the cloud computing application can use easily the security function of TPM.
II. RELATED WORK ABOUT CLOUD
A. Current Security model of the cloud computing
In order to archive security in cloud computing system, some technologies have been used to build the security mechanism for cloud computing. The cloud computing security can be provided as security services. Security messages and secured messages can be transported,
2010 2nd International Conference on Signal Processing Systems (ICSPS)
978-1-4244-6893-5/$26.00 C 2010 IEEE V2-11 understood, and manipulated by standard Web services tools and software. This mechanism is a good choice because the web service technology has been well established in the network-computing environment.
Even the mechanism for the cloud computing security has many merits now, but there are still some disadvantages.
For example, there is short of the mechanism on the hardware to support the trusted computing in cloud computing system. The trusted root in cloud computing environment has not been defined clearly. The