An improved trusted cloud computing platform model based on DAA and privacy CA scheme
Security and privacy are two prime barriers to adoption of the cloud computing. To address this problem on Infrastructure-as-a-Service model, a trusted cloud computing platform model has been proposed to provide a closed box execution environment that guarantees confidential execution of guest virtu...
Saved in:
Published in | 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) Vol. 13; pp. V13-33 - V13-39 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.10.2010
|
Subjects | |
Online Access | Get full text |
ISBN | 9781424472352 1424472350 |
ISSN | 2161-9069 |
DOI | 10.1109/ICCASM.2010.5622643 |
Cover
Abstract | Security and privacy are two prime barriers to adoption of the cloud computing. To address this problem on Infrastructure-as-a-Service model, a trusted cloud computing platform model has been proposed to provide a closed box execution environment that guarantees confidential execution of guest virtual machines. However this model has significant drawbacks that it relies on the trusted third party outside of the cloud circumstance too much. In this paper we show how to address this issue based on the neutral feature of the Trusted Platform Module. By moving the responsibility of managing trusted platforms from the trusted third party to the trusted platforms of Infrastructure-as-a-Service model, our improved TCCP model achieves higher availability, reliability and safety. |
---|---|
AbstractList | Security and privacy are two prime barriers to adoption of the cloud computing. To address this problem on Infrastructure-as-a-Service model, a trusted cloud computing platform model has been proposed to provide a closed box execution environment that guarantees confidential execution of guest virtual machines. However this model has significant drawbacks that it relies on the trusted third party outside of the cloud circumstance too much. In this paper we show how to address this issue based on the neutral feature of the Trusted Platform Module. By moving the responsibility of managing trusted platforms from the trusted third party to the trusted platforms of Infrastructure-as-a-Service model, our improved TCCP model achieves higher availability, reliability and safety. |
Author | Huang Liu-sheng Wang Han-zhang |
Author_xml | – sequence: 1 surname: Wang Han-zhang fullname: Wang Han-zhang email: fishspy@mail.ustc.edu.cn organization: Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China – sequence: 2 surname: Huang Liu-sheng fullname: Huang Liu-sheng email: lshuang@ustc.edu.cn organization: Dept. of Comput. Sci. & Technol., Univ. of Sci. & Technol. of China, Hefei, China |
BookMark | eNpVkM1qwzAQhFWaQtM0T5CLXsCptLJl62jcv0BKD03PQZbWrYtlGcsO5O0raC6dw37MsizD3JFF73skZMPZlnOmHnZVVX68bYHFRSYBZCquyFrlBU8hTXMQubz-5zNYkCVwyRPFpLol6xB-WFSaAUCxJJ9lT1s3jP6Elk7jHKZI0_k5Tu-GeWr7Lzp0emr86KjzFjta6xCPfE8fy5Lq3tJhbE_anGlV0mC-0eE9uWl0F3B94Yocnp8O1Wuyf3_ZVeU-aRWbEmsNZ6bREpRGq2QuagkMudbK1KYGobjitrEccoFpJguIsVkNTW6LQoIWK7L5e9si4jGmcHo8Hy-9iF9na1X2 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ICCASM.2010.5622643 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9781424472376 1424472377 |
EndPage | V13-39 |
ExternalDocumentID | 5622643 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL |
ID | FETCH-LOGICAL-i90t-ddc10cfa629aed9673b620e1aa9cbcb239191dfd1273e456820450b2f7d8862a3 |
IEDL.DBID | RIE |
ISBN | 9781424472352 1424472350 |
ISSN | 2161-9069 |
IngestDate | Wed Aug 27 02:32:09 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i90t-ddc10cfa629aed9673b620e1aa9cbcb239191dfd1273e456820450b2f7d8862a3 |
ParticipantIDs | ieee_primary_5622643 |
PublicationCentury | 2000 |
PublicationDate | 2010-Oct. |
PublicationDateYYYYMMDD | 2010-10-01 |
PublicationDate_xml | – month: 10 year: 2010 text: 2010-Oct. |
PublicationDecade | 2010 |
PublicationTitle | 2010 International Conference on Computer Application and System Modeling (ICCASM 2010) |
PublicationTitleAbbrev | ICCASM |
PublicationYear | 2010 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000452228 ssj0003188875 |
Score | 1.5398177 |
Snippet | Security and privacy are two prime barriers to adoption of the cloud computing. To address this problem on Infrastructure-as-a-Service model, a trusted cloud... |
SourceID | ieee |
SourceType | Publisher |
StartPage | V13-33 |
SubjectTerms | anonymity cloud computing Computer architecture DAA scheme Hardware Organizations privacy preserving Servers trusted computing |
Title | An improved trusted cloud computing platform model based on DAA and privacy CA scheme |
URI | https://ieeexplore.ieee.org/document/5622643 |
Volume | 13 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA_Tkyc_pvhNDh7tliZt2hzLVKYwEZzgbeTjFYazG7IJ-tf7knYVxYOXtiktaR8Jv19e3vs9Qi6QgQrGIIkcT3mUlGkZKaNdlDqZyyRDBIl9NvLoXg6fkrvn9LlDLttcGAAIwWfQ85dhL9_N7cq7yvqI1YjfYoNsZJmqc7Vaf0qQBm-otG_jWMX54yMYOZKaSDGp1nldGRdpK_fUtHmjSBQz1b8dDIrHUR321XT5o_ZKgJ6bbTJaf3QdcfLSWy1Nz37-0nP871_tkP3vJD_60MLXLulAtUe211UeaDPpu-SpqOg0uB7A0ZCigWc7m6_wGB7Gt-lippee_tJQWYd6bHR0XtGroqC6cnTxNn3X9oMOCorLaXiFfTK-uR4PhlFTjCGaKraMnLMxs6WWXGlwSmbCSM4g1lpZYw0XChd-rnQx0iFAUpZ7mXtmeJm5HBdNWhyQzWpewSGhLkkzJ0xurFaJzEEjZ5TAdBInBrgQR6TrjTRZ1HIbk8Y-x3_fPiFbYUM_xNedkk20A5whT1ia8zBAvgAlTLQN |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NS8MwFA9TD3ryG7_NwaOdadKmzbFMZVMnghO8jXy8wnB2QzZB_3pfsm6iePDSNqUlbUj4_d7L-71HyBkyUMEYJJHjKY-SMi0jZbSLUidzmWSIILFXI3fvZfspuXlOnxvkfKGFAYAQfAZNfxn28t3ITr2r7AKxGvFbLJGVFK2KbKbWWnhUQnLwmkz7Ns5WXEE-hpEjrYkUk2qu7Mq4SBcJn-o2r3MSxUxddFqt4rE7C_yqO_1RfSWAz_U66c4_exZz8tKcTkzTfv7K6Pjf_9ogO98yP_qwALBN0oBqi6zP6zzQetlvk6eiooPgfABHg0gDz3Y4muIxPIxv0_FQTzwBpqG2DvXo6OioopdFQXXl6Pht8K7tB20VFA1qeIUd0ru-6rXaUV2OIRooNomcszGzpZZcaXBKZsJIziDWWlljDRcKTT9XuhgJESAty32ie2Z4mbkczSYtdslyNapgj1CXpJkTJjdWq0TmoJE1SmA6iRMDXIh9su0HqT-eJdzo1-Nz8PftU7La7nXv-ned-9tDsha290O03RFZxjGBY2QNE3MSJssX0vC3Xg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+International+Conference+on+Computer+Application+and+System+Modeling+%28ICCASM+2010%29&rft.atitle=An+improved+trusted+cloud+computing+platform+model+based+on+DAA+and+privacy+CA+scheme&rft.au=Wang+Han-zhang&rft.au=Huang+Liu-sheng&rft.date=2010-10-01&rft.pub=IEEE&rft.isbn=9781424472352&rft.issn=2161-9069&rft.volume=13&rft.spage=V13-33&rft.epage=V13-39&rft_id=info:doi/10.1109%2FICCASM.2010.5622643&rft.externalDocID=5622643 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-9069&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-9069&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-9069&client=summon |