06-11-2012, 06:16 PM
The Security of Cloud Computing System enabled by Trusted Computing Technology
1The Security of Cloud.pdf (Size: 201.04 KB / Downloads: 60)
Abstract
Cloud computing provides people the way to share
distributed resources and services that belong to different
organizations or sites. Since cloud computing share distributed
resources via the network in the open environment, thus it
makes security problems important for us to develop the cloud
computing application. In this paper, we pay attention to the
security requirements in cloud computing environment. We
proposed a method to build a trusted computing environment
for cloud computing system by integrating the trusted
computing platform into cloud computing system. We propose
a model system in which cloud computing system is combined
with trusted computing platform with trusted platform module.
In this model, some important security services, including
authentication, confidentiality and integrity, are provided in
cloud computing system.
INTRODUCTION
Since distributed systems and network computing were
used wildly, security has become an urgent problem and
will be more important in the future. In order to improve the
work efficiency, the different services are distributed in
different servers that are distributed in different places. In
contrast to the fast developing of distributed computing
technologies, people have remained insufficient in the field
of information security and safety. In recently, a new trend
attracts people’s attention. Users from multiple environment
hope use the distributed computing more efficient, just like
using the electric power. Then, cloud computing has
become a new star for this demand. cloud computing is
concerned with the sharing and coordinated use of diverse
resources in distributed organizations --- cloud, which is
consisted of different organizes and systems. Cloud
computing provides a facility that enable large-scale
controlled sharing and interoperation among resources that
are dispersedly owned and managed. Security is therefore a
major element in any cloud computing infrastructure,
because it is necessary to ensure that only authorized access
is permitted and secure behavior is accepted.
The challenge for the security in cloud computing
In cloud computing environment, many users participate
in the CLOUD and they join or leave CLOUD dynamically.
Other resources in the cloud computing environments are
the same too. Users, resources, and the CLOUD should
establish the trustful relationship among themselves. And
they will be able to deal with the changing dynamically.
The CLOUD includes distributed users and resource
from distributed local systems or organizes, which have
different security policies. According to this reason, how to
build a suitable relationship among them is a challenge. In
fact, the requirements for the security in cloud computing
environment have some aspects, including confidentiality.
multiple security policy, dynamic of the services., the trust
among the entities, dynamically building trust domains.
In the next section, we will propose the mechanism of
trusted computing platform and other related functions that
aid to achieve the trusted cloud computing, which has a
trusted computing environment.
BUILD TRUSTED CLOUD COMPUTING
SYSTEM USING TCP
As what we have discussed above, the trusted computing
mechanism can provide a way that can help to establish a
security environment. The model of trusted computing is
originally designed to provide the privacy and trust in the
personal platform and the trusted computing platform is the
base of the trusted computing. Since the internet computing
or network computing has been the main computing from
the end of the last century, the model of trusted computing
is being developed to the network computing, especially the
distributed systems environment. The cloud computing is a
promising distributed system model and will act as an
important role in the e-business or research environments.
As web service technology have developed quickly and
have been used broadly, cloud computing system could
evolve to cloud computing service, which integrates the
cloud computing with web service technology.
CONCLUSIONS
We have analyzed the trusted computing in the cloud
computing environment and the function of trusted
computing platform in cloud computing. The advantages of
our proposed approach are to extend the trusted computing
technology into the cloud computing environment to
achieve the trusted computing requirements for the cloud
computing and then fulfill the trusted cloud computing. TCP
is used as the hardware base for the cloud computing system.
In our design, TCP provides cloud computing system some
important security functions, such authentication,
communication security and data protection. Related
methods for these implementations are proposed.
The TCP provides cloud computing a secure base for
achieve trusted computing. But how to integrate well these
hardware modules with cloud computing system is a
challenging work and need more deep research. Now we are
developing an model system of trusted cloud computing,
which is based on the trusted computing platform and can
provide flexible security services for users. We will make
the actual design more practical and operational in the
future.