Name: | Description: | Size: | Format: | |
---|---|---|---|---|
167.67 KB | Adobe PDF |
Advisor(s)
Abstract(s)
Trusted computing is a technology that enables computer systems
to behave in a given expected way. Achieving that goal happens by arming
an isolated piece of hardware with embedded processing, cryptographic ca-
pabilities such as encryption key that is kept safe from software layer attacks.
The mentioned module is accessible to the rest of the computer system via
a well de ned and tested application programming interface. Trusted com-
puting protects the system against external attackers and even against the
owner of the system. Cloud computing enables users to have access to vast
amounts of computational resources remotely, in a seamless and ubiquitous
manner. However, in some cloud deployment models, such as public cloud
computing, users do not have much control over how their data is remotely
handled and are not able to assure that their data is securely processed and
stored. Cloud administrators and other parties can be considered threats in
such cases. Given the ground that cloud has been gaining and the rate at
which data is generated, transmitted, processed and stored remotely, it is
vital to protect it using means that address the ubiquitous nature of the
cloud, including trusted computing. This chapter investigates applications
of trusted computing in cloud computing areas where security threats exist,
namely in live virtual machine migration.
Description
Keywords
Citation
Publisher
Springer International Publishing