Keywords:-

Keywords: cloud computing, trusted computing platform, trusted computing, trusted service.

Article Content:-

Abstract

Cloud computing is a catch-all phrase that covers virtualized operating systems running on virtual hardware on untold numbers of physical servers. It is a paradigm where tasks are assigned to a combination of connections, software and services accessed over a network. The “cloud” term has consumed High Performance Computing (HPC), Grid computing and Utility Computing. It provides people the way to share discrete resources and services that belong to diverse organizations or sites. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this paper, a method to build a trusted computing environment for cloud computing system is by integrating the trusted computing platform into cloud computing system with a model system in which cloud computing system is united with trusted computing platform and trusted platform module. The security necessities in cloud computing environment is the discovery of the vulnerabilities in the landscape of clouds, detection of security solutions, and finding evidence that early adopters or developers have grown more concerned with security with the proposed model. With this model, some important security services including authentication, integrity and confidentiality are provided in cloud computing system.

References:-

References

Mike Kavis, "Real time transactions in the cloud", http://www.kavistechnology.com/

blog pg=789. accessed on April 12, 2009.

Greg Boss, Padma Malladi, Denis Quan, Linda Legregni, Harold Hall, "Cloud

Computing", http://www.ibm.com/deveIopers work/websp here/zones/h ipods/Ii brary.

html, pp. 1-4 , October 2007

MICHAEL BELL, “Introduction to Service-oriented Modeling”, Service-oriented

Modeling: Service Analysis, Design, and Architecture. Wiley& Sons, 3.ISBN 978-0-

- 14111-3, 2008. 4. W. M. BULKELEY, “IBM, Google, Universities Combine ‘Cloud’ Foces”, Wall

Street Journal October 8,2007 http://online.wsj.com/public/article

print/SB119180611310551864.html

From “NSF’S Cyber infrastructure Vision for 21stCentury Discovery,” NSF Cyber

infrastructure Council, September 26th, 2005, Ver.4.0, pg 4.

Wikipedia, “Cyber infrastructure”, http://en.wikipedia.org/wiki/Cyberinfrastructure

http://www.cca-forum.org/, accessed February 2006.

Mike Ricciuti, “Stallman: Cloud computing is stupidity'”, http://news.cnet.com/8301-

_3-10054253-92.html

J. J. Rehr, J. P. Gardner, M. Prange, L. Svec and F. Vila, “Scientific Computing in the

Cloud”, Department of Physics, University of Washington, Seattle [13] Laboratório

Nacional de Computação Científica, “Using Clouds to address Grid Limitations”, Av.

Getúlio Vargas, 333 – Quitandinha 10. Sales force, http://www.salesforce.com/

Google App Engine, http://appengine.google.com

Downloads

Citation Tools

How to Cite
Nageshwar, D. P., Nagaraju, D. I., & Kumar, M. A. (2015). The Trusted Computing Model for Providing Security in Cloud Computing. International Journal Of Mathematics And Computer Research, 3(06), 1018-1024. Retrieved from http://ijmcr.in/index.php/ijmcr/article/view/113