Data Security in Cloud Based on Trusted Computing Environment

In recent years Cloud Computing has become one of the growing fields in computer science. In which the security problem of cloud computing has become a hot research topic. It must be verified in the trusted status of the platform which actually carries out the computing task in the cloud, and the remote mechanism in Trusted Computing is suited for the cloud user's verification need. This paper briefly sketches out the method to build a Trusted Computing Environment for cloud computing system by integrating the Trusted Computing Platform (TCP) with Trusted Platform Module (TPM) into the security of cloud computing system. The RC4 stream cipher algorithm is most used algorithm to provide the confidentiality over the different networks.

Provided by: International Journal of Soft Computing and Engineering (IJSCE) Topic: Cloud Date Added: Mar 2013 Format: PDF

Find By Topic