ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Mutual Authentication Cloud Computing Platform based on TPM

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 11)

Publication Date:

Authors : ; ;

Page : 1446-1450

Keywords : cloud computing; trusted computing; trusted platform module; authentication;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

As cloud computing services appeared on the network in large numbers. The data and calculation of users are stored in the data center of cloud service provider, and of all kinds of resources are available for multiple users to share. Security gradually become an important issue in cloud computing. In order to ensure the security of cloud computing system and protect the users data security and privacy, the identity authentication mechanism between users and cloud computing server must be established. Currently, the technology of trusted computing has become the hotspot in the field of information security. The core of trusted computing is embedded in the terminal platform trusted platform module (TPM). In this paper, the trusted computing technology is applied in cloud computing services. Mutual authentication scheme based on TPM cloud computing platform is proposed. In this scheme it realizes the identity authentication between the users and the cloud computing server. The session key are negotiated to be generated, at the same time the trusted status of the cloud computing server platform is verified.

Last modified: 2021-07-01 14:26:37