IaaS Architecture based on Trusted Computing

被引:0
|
作者
Zhang Wenbo [1 ]
Bao Zhenshan [1 ]
Li Jian [1 ]
Duan Lijuan [1 ]
机构
[1] Beijing Univ Technol, Dept Comp Sci, Beijing 100124, Peoples R China
关键词
Infrastructure as a Service (IaaS); Trusted Computing; Cloud Computing;
D O I
10.4028/www.scientific.net/AMM.513-517.399
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
The dynamic, heterogeneity and complexity make cloud platform much less credible. As a vital level in cloud computing platform, IaaS is very important to improve the trustworthy degree of cloud. In this paper, we explore this area, we identify the fundamental function provided by the trusted IaaS, we identify the indispensable tasks completed by the trusted IaaS, and then we propose a foundation framework for establishing trusted IaaS. Finally, we gave a conclusion and the direction of future works.
引用
收藏
页码:399 / 402
页数:4
相关论文
共 50 条
  • [1] Architectural Design of Trusted Platform for IaaS Cloud Computing
    Kashif, Ubaidullah Alias
    Memon, Zulfiqar Ali
    Siddiqui, Shafaq
    Balouch, Abdul Rasheed
    Batra, Rakhi
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2018, 8 (02) : 47 - 65
  • [3] Design and implementation of trusted boot based on a new trusted computing dual-architecture
    Zheng, Chenming
    Li, Jun
    Yao, Xuanxia
    COMPUTERS & SECURITY, 2023, 127
  • [4] A Trusted Computing Architecture for Health Care
    Rasheed, Amar A.
    2017 31ST INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2017, : 46 - 50
  • [5] An Efficient Security Architecture for Trusted Computing
    Yin Zhixi
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2009, : 599 - 601
  • [6] Trusted computing architecture for secure SOC
    School of Computer Science, National University of Defense Technology, Changsha 410073, China
    Huazhong Ligong Daxue Xuebao, 2008, 11 (44-47):
  • [7] Security Architecture of Trusted Virtual Machine Monitor for Trusted Computing
    HUANG Qiang1
    2. Naval Institute of Computing Technology
    3. College of Information Technical Science
    WuhanUniversityJournalofNaturalSciences, 2007, (01) : 13 - 16
  • [8] A Trusted Computing Architecture for Critical Infrastructure Protection
    Burmester, Mike
    2013 FOURTH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS AND APPLICATIONS (IISA 2013), 2013, : 64 - 69
  • [9] Embedded Trusted Computing Environment Build Based on QEMU Virtual Machine Architecture
    Zhang Lili
    Kong Xiangying
    2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 1, 2014, : 193 - 196
  • [10] An Active Defence Architecture for Industrial Control System based on Trusted Computing 3.0
    Yang Weiyong
    Tao Hongzhu
    Liu Wei
    Wang Jingpei
    Wei Xingshen
    Wang Haiqing
    Huang Hao
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 2080 - 2085