作者
Mohammad Reza Memarian, Diogo Fernandes, Pedro Inácio, Ville Leppänen, Mauro Conti
发表日期
2017
期刊
Research Advances in Cloud Computing
页码范围
449-465
出版商
Springer Singapore
简介
Trusted computing is a technology that enables computer systems to behave in a given expected way. Achieving that goal happens by arming an isolated piece of hardware with embedded processing, cryptographic capabilities such as encryption key that is kept safe from software layer attacks. The mentioned module is accessible to the rest of the computer system via a well-defined and tested application programming interface. Trusted computing protects the system against external attackers and even against the owner of the system. Cloud computing enables users to have access to vast amounts of computational resources remotely, in a seamless and ubiquitous manner. However, in some cloud deployment models, such as public cloud computing, the users have very little control over how their own data is remotely handled and are not able to assure that their data is securely processed and stored …
引用总数
学术搜索中的文章
M Reza Memarian, D Fernandes, P Inácio, V Leppänen… - Research Advances in Cloud Computing, 2017