IaaS Architecture Based on Trusted Computing

Article Preview

Abstract:

The dynamic, heterogeneity and complexity make cloud platform much less credible. As a vital level in cloud computing platform, IaaS is very important to improve the trustworthy degree of cloud. In this paper, we explore this area, we identify the fundamental function provided by the trusted IaaS, we identify the indispensable tasks completed by the trusted IaaS, and then we propose a foundation framework for establishing trusted IaaS. Finally, we gave a conclusion and the direction of future works.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

399-402

Citation:

Online since:

February 2014

Export:

Price:

* - Corresponding Author

[1] Trusted Computing, From Wikipedia. http: /en. wikipedia. org/wiki/Trusted_computing 2013-10-6.

Google Scholar

[2] Trusted Computing Group. http: /www. trustedcomputinggroup. org/ 2013-10-6.

Google Scholar

[3] Zhang Huanguo, Zhao Bo. Trusted Computing [M]. WuHan University Press. 2011. 8. (in Chinese).

Google Scholar

[4] Feng DengGuo, Zhang Min, Zhang Yan, Xu Zhen. Study on cloud computing security [J]. Journal of Software, 2011 22 (1) 71- 83. (in Chinese).

Google Scholar

[5] Yu Nenghai, HAO Zhuo, Xu Jiajia, Zhang Weiming, Zhang Chi. Review of Cloud Computing Security [J]. ACTA ELECTRONICA SINICA, 2013 41(2) 371-381. (in Chinese).

Google Scholar

[6] S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, 2011 34(1), 1-11.

DOI: 10.1016/j.jnca.2010.07.006

Google Scholar

[7] T. Noor and Q. Sheng, Trust as a service: A framework for trust management in cloud environments, in Web Information System Engineering WISE 2011, ser. Lecture Notes in Computer Science, A. Bouguettaya, M. Hauswirth, and L. Liu, Eds. Springer Berlin/Heidelberg, 2011, vol. 6997, 314–321.

DOI: 10.1007/978-3-642-24434-6_27

Google Scholar

[8] Monoj Kumar Muchahari and Smriti Kumar Sinha, A New Trust Management Architecture for Cloud Computing Environment, 2012 International Symposium on Cloud and Services Computing (ISCOS) 2012 136-140.

DOI: 10.1109/iscos.2012.30

Google Scholar

[9] Imad M. Abbadi, A framework for establishing trust in Cloud provenance, In International Journal of Information Security. 2012 (11) 1-18.

Google Scholar

[10] Imad M. Abbadi and Anbang Ruan, Towards Trustworthy Resource Scheduling in Clouds, In IEEE Transactions on Information Forensics & Security, 2013 (6) 8 973-984.

DOI: 10.1109/tifs.2013.2248726

Google Scholar

[11] Openstack-security. http: /www. openstack. org/projects/openstack-security/, 2013-10-6.

Google Scholar

[12] Amazon Web Services. http: /aws. amazon. com/cn/, 2013-10-6.

Google Scholar

[13] Windows Azure. http: /www. windowsazure. com/zh-cn/#, 2013-10-6.

Google Scholar

[14] AWS Cloud Computing Whitepapers: Overview of Security Processes, http: /aws. amazon. com/cn/whitepapers/ March 2013, 2013-10-6.

Google Scholar