A3 Vertaisarvioitu kirjan tai muun kokoomateoksen osa
Applications of Trusted Computing in Cloud Context
Tekijät: Memarian Mohammed Reza, Fernandes Diogo, Inacio Pedro, Leppänen Ville, Conti Mauro
Toimittaja: Sanjay Chaudhary, Gaurav Somani, Rajkumar Buyya
Julkaisuvuosi: 2017
Kokoomateoksen nimi: Research Advances in Cloud Computing
Aloitussivu: 449
Lopetussivu: 465
Sivujen määrä: 17
ISBN: 978-981-10-5025-1
eISBN: 978-981-10-5026-8
DOI: https://doi.org/10.1007/978-981-10-5026-8_18
Verkko-osoite: https://link.springer.com/content/pdf/10.1007/978-981-10-5026-8_18.pdf
Trusted computing is a technology that enables computer systems to
behave in a given expected way. Achieving that goal happens by arming an isolated
piece of hardware with embedded processing, cryptographic capabilities such
as encryption key that is kept safe from software layer attacks. The mentioned module
is accessible to the rest of the computer system via a well-defined and tested
application programming interface. Trusted computing protects the system against
external attackers and even against the owner of the system. Cloud computing enables
users to have access to vast amounts of computational resources remotely, in a seamless
and ubiquitous manner. However, in some cloud deployment models, such as
public cloud computing, the users have very little control over how their own data
is remotely handled and are not able to assure that their data is securely processed
and stored. Cloud administrators and other parties can be considered threats in such
cases. Given the ground that cloud has been gaining and the rate at which data is
generated, transmitted, processed, and stored remotely, it is vital to protect it using
means that address the ubiquitous nature of the cloud, including trusted computing.
This chapter investigates applications of trusted computing in cloud computing areas
where security threats exist, namely in live virtual machine migration.