A Paper on Security in Cloud Computing

3991 Words Sep 27th, 2010 16 Pages
The Security of Cloud Computing System enabled by Trusted Computing
Technology
Zhidong Shen
International School of Software,
Wuhan University,
Wuhan, China, 430079 zhidongshen@163.com Qiang Tong
School of Software,
Northeastern University,
Shenyang, China, 110004 qiang.tong@163.com Abstract—Cloud computing provides people the way to share distributed resources and services that belong to different organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, we pay attention to the security requirements in cloud computing environment. We proposed a method to
…show more content…
The TCP can improve the cloud computing security and will not bring much complexity to users.
Because the TCP is based on relatively independent hardware modules, it does not cost too much resource of
CPU, and can improve the performance of processing cryptographic computation. We also design a software middleware, the Trusted Platform Support Service (TSS), on which the cloud computing application can use easily the security function of TPM.
II. RELATED WORK ABOUT CLOUD
COMPUTING SECURITY
A. Current Security model of the cloud computing
In order to archive security in cloud computing system, some technologies have been used to build the security mechanism for cloud computing. The cloud computing security can be provided as security services. Security messages and secured messages can be transported,
2010 2nd International Conference on Signal Processing Systems (ICSPS)
978-1-4244-6893-5/$26.00 C 2010 IEEE V2-11 understood, and manipulated by standard Web services tools and software. This mechanism is a good choice because the web service technology has been well established in the network-computing environment.
Even the mechanism for the cloud computing security has many merits now, but there are still some disadvantages.
For example, there is short of the mechanism on the hardware to support the trusted computing in cloud computing system. The trusted root in cloud computing environment has not been defined clearly. The

Related Documents