- Trusted Computing and Secure Virtualization in Cloud Computing
- Presentation on theme: "Trusted Computing Platform Alliance"— Presentation transcript:
- Understanding Trusted Computing From The Ground Up
Conventionally, most of the security-relevant functions are concentrated within the operating system.
- Pragmatic Development in First Language Acquisition.
- Trusted Computing;
- Neurotransmission. Proceedings of The Sixth International Congress of Pharmacology.
- A Texas Cowboy: or, Fifteen Years on the Hurricane Deck of a Spanish Pony (Penguin Classics);
- Compressed Earth Blocks. Manual of Production;
- An Enemy of the People (Websters German Thesaurus Edition)!
Often, these functions, especially those dealing with access control, are commingled with object management functions. This article, abstracted from a new book on the subject, explains the key concepts and the exciting potential of Trusted Computing Platforms often abbreviated to Trusted Platforms.
We discuss access control in multilevel database management systems applies and illustrate the main applies of access control based on Trusted Computing in the LogicSQL database system. Ma et al. Request Permissions. A model of access control based on trusted computing, Journal of Chongqing University of Arts and Sciences, , 29 3 , pp. Alberta University Press, Canada. Research of security mechanisms based on LogicSQL database. Secure computer systems: A refinement of the mathematical model.
Integrity considerations for secure computer systems. Samartini and S. Capitani di Vimercati. Access Control: Policies, Models, and Mechanisms. All Rights Reserved.
Trusted Computing and Secure Virtualization in Cloud Computing
Log In. Cite Export. Permanent link. Citation style. More styles. More languages.
Output format. Create Close. The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available. Altmetric score.
Presentation on theme: "Trusted Computing Platform Alliance"— Presentation transcript:
As a result, cloud service CS clients must trust that the CS provider is able to protect their data and infrastructure from both external and internal attacks. Currently however, such trust can only rely on organizational processes declared by the CS provider and can not be remotely verified and validated by an external party. Enabling the CS client to verify the integrity of the host where the virtual machine instance will run, as well as to ensure that the virtual machine image has not been tampered with, are some steps towards building trust in the CS provider.
Having the tools to perform such verifications prior to the launch of the VM instance allows the CS clients to decide in runtime whether certain data should be stored- or calculations should be made on the VM instance offered by the CS provider. This thesis combines three components -- trusted computing, virtualization technology and cloud computing platforms -- to address issues of trust and security in public cloud computing environments.
Understanding Trusted Computing From The Ground Up
Of the three components, virtualization technology has had the longest evolution and is a cornerstone for the realization of cloud computing. Trusted computing is a recent industry initiative that aims to implement the root of trust in a hardware component, the trusted platform module. The initiative has been formalized in a set of specifications and is currently at version 1.
Cloud computing platforms pool virtualized computing, storage and network resources in order to serve a large number of customers customers that use a multi-tenant multiplexing model to offer on-demand self-service over broad network. Open source cloud computing platforms are, similar to trusted computing, a fairly recent technology in active development.