11-05-2011, 04:41 PM
Abstract
Cloud computing provides people the way to sharedistributed resources and services that belong to differentorganizations or sites. Since cloud computing share distributedresources via the network in the open environment, thus itmakes security problems important for us to develop the cloudcomputing application. In this paper, we pay attention to thesecurity requirements in cloud computing environment. Weproposed a method to build a trusted computing environmentfor cloud computing system by integrating the trustedcomputing platform into cloud computing system. We proposea model system in which cloud computing system is combinedwith trusted computing platform with trusted platform module.In this model, some important security services, includingauthentication, confidentiality and integrity, are provided incloud computing system.Keywords-cloud computing; trusted computing platform;trusted computing; trusted service
I. INTRODUCTION
Since distributed systems and network computing wereused wildly, security has become an urgent problem andwill be more important in the future. In order to improve thework efficiency, the different services are distributed indifferent servers that are distributed in different places. Incontrast to the fast developing of distributed computingtechnologies, people have remained insufficient in the fieldof information security and safety. In recently, a new trendattracts people’s attention. Users from multiple environmenthope use the distributed computing more efficient, just likeusing the electric power. Then, cloud computing hasbecome a new star for this demand. cloud computing isconcerned with the sharing and coordinated use of diverseresources in distributed organizations --- cloud, which isconsisted of different organizes and systems. Cloudcomputing provides a facility that enable large-scalecontrolled sharing and interoperation among resources thatare dispersedly owned and managed. Security is therefore amajor element in any cloud computing infrastructure,because it is necessary to ensure that only authorized accessis permitted and secure behavior is accepted. In a word, allmembers in the cloud and the cloud computingenvironment should be trusted by each other, and themembers that have communication should be trusted byeach other. Trust is the major concern of the consumers andprovider of services that participate in a cloud computingenvironment.Because the cloud computing is composed of differentlocal systems and includes the members from multipleenvironments, therefore the security in cloud is complicate.In one side, the security mechanism should provideguarantees secure enough to the user, on the other side, thesecurity mechanism should not be too complex to put theusers into an inconvenient situation. The openness andflexibility of the computer and popular commercialoperating systems have been important factors supportingtheir widespread adoption. However, that very sameopenness and flexibility have been proved to be a doubleedged sword, because it brings complexity, reduces trustdegree and threat against security. So there should be abalance between the security and the convenience [5]. Thedependable and secure computing includes not only securityand confidentiality, but also reliability, availability, safetyand integrity [10]. Considering these facts, we propose anew way that is conducive to improve the secure anddependable computing in cloud. In our design, we integratethe Trusted Computing Platform (TCP), which is based onTrusted Platform Module (TPM), into the cloud computingsystem. The TCP will be used in authentication,confidentiality and integrity in cloud computingenvironment. The TCP can improve the cloud computingsecurity and will not bring much complexity to users.Because the TCP is based on relatively independenthardware modules, it does not cost too much resource ofCPU, and can improve the performance of processingcryptographic computation. We also design a softwaremiddleware, the Trusted Platform Support Service (TSS),on which the cloud computing application can use easily thesecurity function of TPM.
Download full report
http://ieeexplore.ieeeiel5/5547586/55552...er=5555234