Grin logo
en de es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencias de la computación - Internet, nuevas tecnologías

A Trusted Cloud Computing With Cryptographic Technique

Título: A Trusted Cloud Computing With Cryptographic Technique

Libro Especializado , 2013 , 30 Páginas , Calificación: A

Autor:in: Raja Praveen.k.n (Autor)

Ciencias de la computación - Internet, nuevas tecnologías
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

This book focuses on the security issues in Cloud Computing System; Cloud Computing is an upcoming paradigm that offers tremendous advantages in economical aspects such as reduced time to market, flexible computing capabilities and limitless computing power. To use the full potential of the cloud computing, data is transferred, processed and stored by external cloud providers. However, data owners are very skeptical to place their data outside their own control sphere. This book discusses the security controls to protect data in cloud computing environment using Cryptographic technique.

Cloud computing provide the way to share distributed resources and services that belong to different organizations. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this book, we pay attention to the security requirements in cloud computing environment. We proposed a method to build a trusted computing environment using cryptographic technique, for cloud computing system by integrating the trusted computing platform into cloud computing system. Security has become a major concern in cloud computing environment. Where the resources are shared by many. Users join and leave the cloud dynamically which leads to a serious challenge for the security of shared resources. Hence there’s a need to establish trust in the cloud so that the users are ensured of their data security. We propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module. In this model, some important security services, including authentication, confidentiality, data Storage, data security and access control, are provided in cloud computing system.

Extracto


Inhaltsverzeichnis (Table of Contents)

  • CHAPTER 1
    • INTRODUCTION
    • 1.1 Product prospective
    • 1.2 Objectives
  • CHAPTER 2
    • MATERIALS AND METHODS
    • 2.1 Cloud Computing System
    • 2.2 Architecture of Cloud Computing System
    • 2.3 Security of Cloud Computing System Architecture
    • 2.4 A Trusted Cloud Computing with Cryptographic technique
    • 2.5 Implementation Tools
    • 2.6 Implementation procedure for TCCT with CGT
  • CHAPTER 3
    • RESULT AND DISCUSSION
  • CHAPTER 4
    • SUMMARY AND CONCLUSION
  • REFERENCES

Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)

This book aims to address security concerns within the cloud computing environment. The authors highlight the benefits of cloud computing, particularly cost-effectiveness, flexibility, and scalability. However, they recognize the data security concerns that arise from outsourcing data management to external cloud providers. The book explores the implementation of cryptographic techniques to enhance trust and data security in cloud computing. Key themes addressed in the book include: * **Cloud Computing Security:** The text focuses on securing data in the cloud computing environment. * **Cryptographic Techniques:** The book proposes the use of cryptographic techniques as a solution to secure cloud computing systems. * **Trusted Computing Platform:** The book integrates a Trusted Computing Platform (TCP) with a Trusted Platform Module (TPM) into the cloud computing system to enhance security. * **Data Security and Access Control:** The book addresses the importance of securing data storage, confidentiality, and access control within the cloud computing environment. * **Authentication:** The authors explore authentication methods to ensure the security of data and user access within the cloud.

Zusammenfassung der Kapitel (Chapter Summaries)

Chapter 1: Introduction

Chapter 1 introduces the concept of cloud computing, outlining its benefits and challenges. It emphasizes the significance of security in cloud computing, given the shared and distributed nature of resources. The authors highlight the need for trust between users and cloud providers to ensure data security. They introduce "A Trusted Cloud Computing with Cryptographic Technique" as a potential security solution.

Chapter 2: Materials and Methods

Chapter 2 delves into the architecture of cloud computing systems and explores the security implications of this architecture. It presents the authors' proposed method for building a trusted computing environment within cloud systems using cryptographic techniques. This chapter also discusses the implementation tools and procedures used for the proposed solution.

Chapter 3: Result and Discussion

Chapter 3 presents the results of the proposed approach, exploring the effectiveness of cryptographic techniques in enhancing cloud computing security. This chapter provides a detailed analysis and discussion of the findings, highlighting the strengths and limitations of the proposed model.

Chapter 4: Summary and Conclusion

Chapter 4 offers a concise summary of the book's key findings and contributions. It provides a concluding perspective on the importance of trusted computing platforms and cryptographic techniques for improving cloud computing security.

Schlüsselwörter (Keywords)

This book centers around the intersection of cloud computing and security, exploring the implementation of cryptographic techniques to enhance trust and data security in cloud environments. Key terms and concepts include: cloud computing, security, cryptographic techniques, trusted computing platform, trusted platform module, data security, authentication, access control, and data storage.
Final del extracto de 30 páginas  - subir

Detalles

Título
A Trusted Cloud Computing With Cryptographic Technique
Calificación
A
Autor
Raja Praveen.k.n (Autor)
Año de publicación
2013
Páginas
30
No. de catálogo
V262478
ISBN (Ebook)
9783656509301
ISBN (Libro)
9783656508908
Idioma
Inglés
Etiqueta
Cloud Computing Trusted Cloud Computing
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Raja Praveen.k.n (Autor), 2013, A Trusted Cloud Computing With Cryptographic Technique, Múnich, GRIN Verlag, https://www.grin.com/document/262478
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  30  Páginas
Grin logo
  • Grin.com
  • Page::Footer::PaymentAndShipping
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint