خلاصه
مقدمه
II. بررسی ادبیات
III. روش شناسی
کار آینده
نتیجه
نویسندگان
ارقام
منابع
Abstract
I. Introduction
II. Literature Review
III. Methodology
Future Work
Conclusion
Authors
Figures
References
چکیده
پلتفرمهای رایانش ابری ساخته شده بر روی فناوری محاسبات قابل اعتماد معمولاً به عنوان محاسبات ابری مورد اعتماد شناخته میشوند. جزء اصلی این فناوری به عنوان ماژول پلتفرم قابل اعتماد (TPM) شناخته می شود. مشخصات آن توسط کنسرسیومی به نام Trusted Computing Group (TCG) ارائه شده است. اگرچه TPM یک ماژول غیرقابل حرکت است و در داخل هر رایانه ای ثابت است، اما اعتبار آن را می توان با دستگاه های دیگر به اشتراک گذاشت. این مقاله مدل دسترسی برای ماشین مجازی (VM) یک پروتکل اعتماد توزیع شده را ارائه میکند که مبتنی بر TPM است، که از طریق آن اعتبار مصرفکننده با سایر دستگاههای قابل اعتماد به اشتراک گذاشته میشود. این اعتبارنامه ها اساساً یکپارچگی VM را توصیف می کنند.
Abstract
Cloud computing platforms constructed on Trusted Computing Technology are commonly referred to as trusted cloud computing. The core component of this technology is known as Trusted Platform Module (TPM). Its specifications are given by the consortium known as Trusted Computing Group (TCG). Though TPM is an immovable module and is fixed inside any computer, yet its credentials can be shared with other devices. This paper presents the accessibility model for Virtual Machine (VM) of a distributed trust protocol which is based on TPM, through which consumer's credentials are shared to other trusted devices. These credentials essentially describe the integrity of VM.
Introduction
Cloud computing is a new way of outsourcing IT services as an online service. Although varying to the field of distributed, cluster or grid computing the use of the Internet in cloud computing separates it from the cluster and the grid computation. As per the terminology of cloud computing implies, the word cloud refers to the Internet that rawhides the basic enigmas of cloud computing users and conveys the seamless thinking of accepting Information Communication Technology (ICT) computation facilities from the cloud service provider (CSP). The domain of cloud computing includes three components namely Cloud Infrastructure, Cloud Provider and Cloud Consumer. Cloud computing services are used in other forms of conveyance such as Software as a Service, Platform as a Service and infrastructure as a service. According the definition of SaaS, code and databases furnished to several clients. In PaaS, software development platform is provided. IaaS allows the consumer to produce a complete and fully functional virtual machine with network capability, data storage devices, CPU or GPU processing, run time memory and almost all other resources needed for integration.
Cloud services can be used likewise we use utilities in our daily life i.e. pay what you use. IaaS model is a fundamental layer for the cloud environment. At this layer computing resources are designed for virtualization purposes, in order to achieve widespread distribution and deployment. Due to high deployment, there is a high risk of security attacks and it is very difficult for a cloud buyer to rely on such a multitenant site. Cloud computing and IaaS security issues such as data security and privacy, trust, multiple tenants, damage, and data leaks, malicious VM etc are shown in [2] and [3]. Caring these issues it is very difficult for the consumer to rely on the infrastructure provided to the consumer. User stores data in bought machines (VM) swung on the provider facet for processing and other purposes. It is important to examine the cloud equipment for privateness and integrity before, after and at some stage in VM implementation. The literature reviewed for this motive conveys the clean impact that there may be a loss of such structures that permit the user to discover a VM controlled with integrity and privateness. In the IaaS framework all environmental safety measures are done via way of means of the provider, so the user ought to depend now no longer best on his or her infrastructure however additionally on his or her personal countermeasures
Conclusion
Cloud computing is an internet-centric technology for outsourcing IT services such as software, platform, and infrastructure. In this research work accessibility model for the guest VM is proposed. In the proposed model integrity values of guest VM are shared and synchronized with more than one authenticated client devices to access the guest VM from everywhere and anywhere.