Repository logo
 
No Thumbnail Available
Publication

Applications of Trusted Computing in Cloud Context

Use this identifier to reference this record.
Name:Description:Size:Format: 
ApplicationsTCCC-2017.pdf167.67 KBAdobe PDF Download

Advisor(s)

Abstract(s)

Trusted computing is a technology that enables computer systems to behave in a given expected way. Achieving that goal happens by arming an isolated piece of hardware with embedded processing, cryptographic ca- pabilities such as encryption key that is kept safe from software layer attacks. The mentioned module is accessible to the rest of the computer system via a well de ned and tested application programming interface. Trusted com- puting protects the system against external attackers and even against the owner of the system. Cloud computing enables users to have access to vast amounts of computational resources remotely, in a seamless and ubiquitous manner. However, in some cloud deployment models, such as public cloud computing, users do not have much control over how their data is remotely handled and are not able to assure that their data is securely processed and stored. Cloud administrators and other parties can be considered threats in such cases. Given the ground that cloud has been gaining and the rate at which data is generated, transmitted, processed and stored remotely, it is vital to protect it using means that address the ubiquitous nature of the cloud, including trusted computing. This chapter investigates applications of trusted computing in cloud computing areas where security threats exist, namely in live virtual machine migration.

Description

Keywords

Citation

Research Projects

Organizational Units

Journal Issue