Repository logo
 
Publication

Applications of Trusted Computing in Cloud Context

dc.contributor.authorMemarian, Mohammad Reza
dc.contributor.authorFernandes, Diogo A. B.
dc.contributor.authorInácio, Pedro R. M.
dc.contributor.authorLeppänen, Ville
dc.contributor.authorConti, Mauro
dc.date.accessioned2020-02-12T12:25:00Z
dc.date.available2020-02-12T12:25:00Z
dc.date.issued2017
dc.description.abstractTrusted computing is a technology that enables computer systems to behave in a given expected way. Achieving that goal happens by arming an isolated piece of hardware with embedded processing, cryptographic ca- pabilities such as encryption key that is kept safe from software layer attacks. The mentioned module is accessible to the rest of the computer system via a well de ned and tested application programming interface. Trusted com- puting protects the system against external attackers and even against the owner of the system. Cloud computing enables users to have access to vast amounts of computational resources remotely, in a seamless and ubiquitous manner. However, in some cloud deployment models, such as public cloud computing, users do not have much control over how their data is remotely handled and are not able to assure that their data is securely processed and stored. Cloud administrators and other parties can be considered threats in such cases. Given the ground that cloud has been gaining and the rate at which data is generated, transmitted, processed and stored remotely, it is vital to protect it using means that address the ubiquitous nature of the cloud, including trusted computing. This chapter investigates applications of trusted computing in cloud computing areas where security threats exist, namely in live virtual machine migration.pt_PT
dc.description.versioninfo:eu-repo/semantics/publishedVersionpt_PT
dc.identifier.isbn978-981-10-5026-8
dc.identifier.urihttp://hdl.handle.net/10400.6/9235
dc.language.isoengpt_PT
dc.peerreviewedyespt_PT
dc.publisherSpringer International Publishingpt_PT
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/pt_PT
dc.titleApplications of Trusted Computing in Cloud Contextpt_PT
dc.typebook part
dspace.entity.typePublication
oaire.citation.endPage465pt_PT
oaire.citation.startPage449pt_PT
oaire.citation.titleResearch Advances in Cloud Computingpt_PT
person.familyNameInácio
person.givenNamePedro
person.identifier.ciencia-idBF1D-BCA4-179F
person.identifier.orcid0000-0001-8221-0666
person.identifier.ridI-1778-2019
person.identifier.scopus-author-id27168727400
rcaap.embargofctPor não conhecer as permissões de acesso da editora com detalhe, preferia deixar o acesso fechado por agora e revisitar o assunto adiante.pt_PT
rcaap.rightsclosedAccesspt_PT
rcaap.typebookPartpt_PT
relation.isAuthorOfPublicationd1a02783-1cad-4e7f-84a7-2e29c0a51774
relation.isAuthorOfPublication.latestForDiscoveryd1a02783-1cad-4e7f-84a7-2e29c0a51774

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
ApplicationsTCCC-2017.pdf
Size:
167.67 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: