This book focuses on the security issues in Cloud Computing System; Cloud Computing is an upcoming paradigm that offers tremendous advantages in economical aspects such as reduced time to market, flexible computing capabilities and limitless computing power. To use the full potential of the cloud computing, data is transferred, processed and stored by external cloud providers. However, data owners are very skeptical to place their data outside their own control sphere. This book discusses the security controls to protect data in cloud computing environment using Cryptographic technique.
Cloud computing provide the way to share distributed resources and services that belong to different organizations. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this book, we pay attention to the security requirements in cloud computing environment. We proposed a method to build a trusted computing environment using cryptographic technique, for cloud computing system by integrating the trusted computing platform into cloud computing system. Security has become a major concern in cloud computing environment. Where the resources are shared by many. Users join and leave the cloud dynamically which leads to a serious challenge for the security of shared resources. Hence there’s a need to establish trust in the cloud so that the users are ensured of their data security. We propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module. In this model, some important security services, including authentication, confidentiality, data Storage, data security and access control, are provided in cloud computing system.
Table of Contents
CHAPTER 1 INTRODUCTION
1.1 Product prospective
1.2 Objectives
CHAPTER 2 MATERIALS AND METHODS
2.1 Cloud Computing System
2.2 Architecture of Cloud Computing System
2.3 Security of Cloud Computing System Architecture
2.4 A Trusted Cloud Computing with Cryptographic technique
2.5 Implementation Tools
2.6 Implementation procedure for TCCT with CGT
CHAPTER 3 RESULT AND DISCUSSION
CHAPTER 4 SUMMARY AND CONCLUSION
Research Objectives and Core Themes
This work addresses critical security vulnerabilities within cloud computing environments by proposing a robust, trusted computing model that utilizes cryptographic techniques, specifically symmetric key encryption, to ensure data integrity, confidentiality, and secure authentication for both service providers and users.
- Integration of Trusted Computing Platforms (TCP) into cloud infrastructures.
- Implementation of symmetric key encryption for granular data security.
- Development of secure authentication mechanisms for cloud users and administrators.
- Evaluation of performance improvements over existing standard security practices.
Excerpt from the Book
2.4 Trusted Cloud Computing with Cryptographic Technique
Need of Trusted Computing, problems of widely used security applications is to protect the hardware platform against attacks on its integrity or modification of the security software. Within the PC area typical incidents and attacks are well known and are endangering PCs for home banking, but also on servers within companies and some other organizations which are used for very sensible and important data, like personal, e-commerce and billing few others. In embedded systems such incidents happen. examples are illegal changes or manipulations of data in controllers within automotive systems, e.g. odometer values for increasing the car value or vehicle theft protection systems but also other embedded system which handle goods of value.
Current approaches for solving this problem purely at the software level are by their very principle unpromising. As has since been amply confirmed from experience and security trends in the smart card world, a trusted and tamperproof security basis cannot be implemented using software-based solutions alone. This of course applies equally to host systems such as PC platforms as well as embedded controllers.
Trusted Computing Group, Major companies in the PC sector have therefore joined forces and worked to solve this problem with the aid of a new hardware approach and the creation of an associated industry standard. In 1999 Compaq, Hewlett-Packard, IBM, Intel and Microsoft established the Trusted Computing Platform Alliance; main aim was to create Trusted Clients. In order to make important applications like networks, communications and e-commerce more trustworthy. The emerging Trusted Computing Standard employs a secure hardware structure whose main component, the Trusted Platform Module (TPM), is specified as an LSI security chip.
Summary of Chapters
CHAPTER 1 INTRODUCTION: This chapter introduces the fundamental concepts of cloud computing and outlines the security challenges that necessitate a more robust, trust-based architecture.
CHAPTER 2 MATERIALS AND METHODS: This section details the architectural design of the proposed trusted cloud computing system, including service models, deployment strategies, and the implementation of specific cryptographic security modules.
CHAPTER 3 RESULT AND DISCUSSION: This chapter presents a comparative performance analysis of the proposed system against existing security frameworks to demonstrate its effectiveness in enhancing data security.
CHAPTER 4 SUMMARY AND CONCLUSION: The final chapter summarizes the research findings and reflects on the potential for further development and practical implementation of the proposed security methods.
Keywords
Cloud Computing, Trusted Computing, Cryptographic Technique, Symmetric Key Encryption, Trusted Platform Module, TPM, Data Security, Authentication, Confidentiality, Data Storage, Access Control, System Architecture, Network Security.
Frequently Asked Questions
What is the primary focus of this research?
The research focuses on addressing security gaps in cloud computing by integrating Trusted Computing technology and cryptographic mechanisms to ensure a more secure environment for data storage and access.
What are the central themes discussed in the book?
The central themes include cloud architecture, security vulnerabilities, the application of Trusted Platform Modules (TPM), and the implementation of symmetric key encryption for data protection.
What is the main objective of the proposed system?
The primary objective is to enhance authentication, confidentiality, and data integrity by combining standard cloud service models with a trusted computing platform layer.
Which scientific methods are employed?
The work employs a system modeling and design approach, utilizing symmetric key encryption as the core cryptographic technique to authenticate users and secure data uploads/downloads.
What topics are covered in the main section?
The main section covers the architecture of cloud computing systems, specific security requirements, the implementation of security modules, and performance comparisons with existing frameworks.
Which keywords characterize this work?
Key terms include Cloud Computing, Trusted Computing, Cryptographic Technique, Symmetric Key Encryption, TPM, Data Security, and Authentication.
How does the proposed system handle user authentication?
The system utilizes a unique ID generation process managed by the cloud administrator, supported by symmetric keys that ensure only authenticated users can access specific resources.
What is the role of the Trusted Platform Module (TPM) in this model?
The TPM serves as the hardware-based security foundation, providing a "unique secret key" for machines to establish platform integrity and enable secure communication and authentication.
Why is symmetric key encryption preferred in this study?
Symmetric key encryption is used to create a 1:1 security ratio for data uploads, ensuring that every file is secured by a unique key that must be validated for decryption, thus increasing data privacy.
- Quote paper
- Raja Praveen.k.n (Author), 2013, A Trusted Cloud Computing With Cryptographic Technique, Munich, GRIN Verlag, https://www.grin.com/document/262478