Trusted Attestation System for Cloud Computing Environment Using Trusted Platform Module
Internet of Things and Cloud Computing
Volume 5, Issue 3, June 2017, Pages: 38-43
Received: Mar. 21, 2017;
Accepted: Apr. 18, 2017;
Published: Jun. 19, 2017
Views 790 Downloads 66
E. Padma, Department of CSE, SCSVMV University, Kanchipuram, India; Department of CSA & SJCAC, SCSVMV University, Kanchipuram, India
S. Rajalakshmi, Department of CSE, SCSVMV University, Kanchipuram, India; Department of CSA & SJCAC, SCSVMV University, Kanchipuram, India
In the context of Trusted Attestation System in Cloud Computing Environment the Root of Trust for Attestation plays a vital role for security feature with Trusted Computing. The main aim of trusted attestation process is to provide an effective mechanism for the interconnected public and private systems in a well secured platform using Trusted Platform Module. The mechanism created by the trusted attestation phase gains assurance about data integrity and trustworthiness. The Trusted Attestation System enables the trusted computing functionalities for all authorized users in the current working environment. The Cloud Computing Environment extends the failure rate as attacks on public data and private data for the trusted system. The authenticated integrity state of a trusted system involves the Root of Trust for Attestation (RTA). In the cloud environment an attested user is trusted to behave with the available standard technologies like management of identity, digital signatures, exchange of credential, certificates and management of key. The trusted attestation system in the cloud environment provides Trust as a service (TaaS) for the generation of key. The credential exchange for the trusted environment enhances the facility for Cloud Computing Environment (CCE).
Trusted Attestation System for Cloud Computing Environment Using Trusted Platform Module, Internet of Things and Cloud Computing.
Vol. 5, No. 3,
2017, pp. 38-43.
Copyright © 2017 Authors retain the copyright of this article.
This article is an open access article distributed under the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/
) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
The Trusted Computing Group. Retrieved from http://www.trusted computing group.org.
TCG, TCG TPM Specification Version1.2 Revision103, Retrieved from https://www.trusted computing group.org/specs/TPM.
Xing Huangand Yuxing Peng“An Effective Approach for Remote Attestation in Trusted Computing Proceeding sofInternational Symposium on Web Information Systems and Application” May 22- 242009.
Udhayakumar Shanmugam, LathaTamilselvan, UmaNandhini and Dhinakaran “Attestation for Trusted Computing to Assure Security in Cloud Deployment Services International Journal of Information and Electronics Engineering”, Vol.2, No.4, July2012.
Mr.RavindraK.Gupta, Mr.RajatPali, Dr.ShailendraSingh, Mr.GajendraSingh, Mr.Ashutoshk.Dubey “A Comparison with Property Based Resource Attestation to Secure Cloud Environment” CS & IT-CSCP2012. Pp.319–330, 2012.
Trusted Platform Module (TPM) Specifications Retrieved from https://www.truste computing group.org/specs/TPM.
TCG Infrastructure Workgroup Subject Key Attestation Evidence Extension, Specification Version1.0 Revision7 June2005.
S.Udhayakumar, S.Chandrasekar, L.Tamilselvanan and F.Ahmed, “An Adaptive Trust Model for software service sin Hybrid cloud Environment,” Proc.15 WSEAS conference on Systems, Recent Researches in Computer Science, 2011, pp.493-502.
D.Harrison McKnight and NormanL.Chervany, “Conceptualizing Trust: A Typology and E-Commerce Customer Relationships Model,” in 34th Hawaii International Conference on System Sciences, Island of Maui, HI, USA, 2001.
ClausFritzner, LeifNilsenAndsmundSkomedal, “Protecting Security Information in Distributed Systems”, GH29868\91/0000/0245$01.00@1991 IEEE.
ZhidongShen, QiangTong, “The Security of Cloud Computing System enabled by Trusted Computing Technology”, 2nd International Conference on Signal Processing Systems (ICSPS) 2010.
Q.Zhang, T.Yu, and K.Irwin, “A Classification Scheme for Trust Functions in Reputation-Based Trust Management”, in International Workshop on Trust, Security and Reputation on the Semantic Web, Hiroshima, Japan, 2004.
LiangGu, XuhuaDing, RobertH.Deng, YanzhenZou, BingXie, WeizhongShao, HongMei, Model–Driven“Remote Attestation: Attesting Remote System from Behavioral Aspect”. The 9th International Conference for Young Computer Scientists, Zhangjiajie, China, November18, 2008.
E.Padma, Dr.S.Rajalakshmi “The Privacy Feature of Trusted Computing Technology using the Concept of Direct Anonymous Attestation with Cloud as a Technique” International Journal of Computer Engineering and Technology(IJCET), ISSN 0976-6367(Print), ISSN0976-6375(Online) Volume5, Issue2, February2014. Pp140-144.
E.Padma, Dr.S.Rajalakshmi “An Effective Approach for Trusted Attestation Key in Distributed Computing Environmen tusing TPM” International Journal of Applied Engineering Research (IJAER), ISSN0973-4562Volume9, Number22 (2014) pp12087-12096.