Mutual Authentication Cloud Computing Platform based on TPM
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)Publication Date: 2015-11-05
Authors : Lei Peng; Yanli Xiao;
Page : 1446-1450
Keywords : cloud computing; trusted computing; trusted platform module; authentication;
Abstract
As cloud computing services appeared on the network in large numbers. The data and calculation of users are stored in the data center of cloud service provider, and of all kinds of resources are available for multiple users to share. Security gradually become an important issue in cloud computing. In order to ensure the security of cloud computing system and protect the users data security and privacy, the identity authentication mechanism between users and cloud computing server must be established. Currently, the technology of trusted computing has become the hotspot in the field of information security. The core of trusted computing is embedded in the terminal platform trusted platform module (TPM). In this paper, the trusted computing technology is applied in cloud computing services. Mutual authentication scheme based on TPM cloud computing platform is proposed. In this scheme it realizes the identity authentication between the users and the cloud computing server. The session key are negotiated to be generated, at the same time the trusted status of the cloud computing server platform is verified.
Other Latest Articles
- Kinetics and Equilibrium Study on the Removal of Ni (II) Using Activated Carbon-Tio2 Nano Composite
- Fertility Status of Soils at the Teaching and Research Farm of Akwa Ibom State University, Obio Akpa Campus, Southeast Nigeria
- Relationship between Financial Risk and Financial Performance: An Insight of Indian Insurance Industry
- The Zeros of Polar Derivative of Polynomials with Respect to Real Number
- A Review on Study and Analysis the Wastage Reduction of Fluorescent Powder in CFL 23 W in Philips Pvt Ltd Mohali, Using Six Sigma Methodology
Last modified: 2021-07-01 14:26:37