Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review

被引:42
作者
Ibrahim, Fady A. M. [1 ]
Hemayed, Elsayed E. [1 ,2 ]
机构
[1] Cairo Univ, Dept Comp Engn, Fac Engn, Giza 12613, Egypt
[2] Univ Sci & Technol, Zewail City Sci & Technol, Giza 12578, Egypt
关键词
Trusted Cloud Computing; IaaS; vTPM; vDRTM; Remote Attestation; Trusted Virtual Domain; VIRTUAL MACHINES; SECURITY; ACCESS; MODEL; IMPLEMENTATION; ATTESTATION; ENVIRONMENT; PROTOCOL;
D O I
10.1016/j.cose.2018.12.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is no longer the future but the present. Security and trust are critical in cloud computing, but how can cloud service tenants trust cloud service providers to store all their private data on the cloud? Trusted computing is one of the new technologies in the last decade, and the integration between cloud computing and trusted computing can create a new architecture for infrastructure as a service that motivates more cloud service tenants to trust cloud service providers. This paper provides a survey and systematic literature review on the suggested architectures for this integration. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:196 / 226
页数:31
相关论文
共 97 条
[1]  
Abbadi I. M., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P127, DOI 10.1109/TrustCom.2012.107
[2]   Digital Trust - Trusted Computing and Beyond A Position Paper [J].
Akram, Raja Naeem ;
Ko, Ryan K. L. .
2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, :884-892
[3]  
Anbang R., 2011, P 6 ACM WORKSH SCAL, P3, DOI DOI 10.1145/2046582.2046586
[4]  
Anderson Melvin J, 2007, Towards Trustworthy Virtualization Environments: Xen Library OS Security Service Infrastructure, P88
[5]  
[Anonymous], 2010, CCSW 10
[6]  
[Anonymous], P S CLOUD COMP
[7]   Intrusion damage assessment for multi-stage attacks for clouds [J].
Arshad, Junaid ;
Azad, Muhammad Ajmal ;
Jokhio, Imran Ali ;
Townend, Paul .
IET COMMUNICATIONS, 2013, 7 (12) :1304-1315
[8]   Cloud Computing Security: Opportunities and Pitfalls [J].
Arshad, Junaid ;
Townend, Paul ;
Xu, Jie ;
Jie, Wei .
INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2012, 4 (01) :52-66
[9]   A novel intrusion severity analysis approach for Clouds [J].
Arshad, Junaid ;
Townend, Paul ;
Xu, Jie .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2013, 29 (01) :416-428
[10]   M2M-REP: Reputation system for machines in the internet of things [J].
Azad, Muhammad Ajmal ;
Bag, Samiran ;
Hao, Feng ;
Salah, Khaled .
COMPUTERS & SECURITY, 2018, 79 :1-16