A Trusted-based Cloud Computing Virtual Storage System and Key Technologies

被引:1
作者
Wu, K. H. [1 ]
Chen, L. [1 ]
Li, Yi [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing 102206, Peoples R China
关键词
trusted; Cloud Computing; virtual storage; cloud storage; encryption; authentication; MANAGEMENT;
D O I
10.15837/ijccc.2015.4.1992
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of Cloud Computing, people become incresingly concern about security problems, especially the data security, which has become the biggest obstacle for the development of Cloud Computing. In order to protect confidentiality and integrity of user data in Cloud Computing, this paper firstly studies the relevant research works in fields of trusted computing and Cloud Computing data protection and secondly introduces the concept of trusted into Cloud Computing data protection, presents the concept of Trusted Virtual Block Storage Device (TVBSD) and designs the Trusted Cloud Computing Virtual Storage System (TCCVSS). And then, the key technologies such as isolation, block device encryption and two-way authentication are expounded in this paper. Finally, the result of experiments shows that the system and the related technologies can not only effectively ensure the security of user data, but also control the consequent performance overhead in a proper range.
引用
收藏
页码:579 / 592
页数:14
相关论文
共 15 条
[1]  
[Anonymous], 2007, ACM SIGOPS OPERATING, DOI DOI 10.1145/1323293.1294294
[2]  
Chen J., 2011, DESIGN IMPLEMENTATIO
[3]  
[程芳权 Cheng Fangquan], 2013, [计算机研究与发展, Journal of Computer Research and Development], V50, P1613
[4]  
Dan Wang, 2010, Proceedings of the 2010 2nd International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2010), P81, DOI 10.1109/NSWCTC.2010.27
[5]  
Fox A., 2009, Above the Clouds: A Berkeley view of Cloud computing, V28, P13
[6]   India's role in the globalization of IT [J].
Aggarwal, Alok .
COMMUNICATIONS OF THE ACM, 2008, 51 (07) :17-19
[7]  
Heiser J., 2008, ASSESSING SECURITY R
[8]  
Kühn U, 2005, LECT NOTES COMPUT SC, V3659, P324
[9]  
Pearson S, 2009, LECT NOTES COMPUT SC, V5931, P90, DOI 10.1007/978-3-642-10665-1_9
[10]   Research on trusted computing and its development [J].
Shen ChangXiang ;
Zhang HuanGuo ;
Wang HuaiMin ;
Wang Ji ;
Zhao Bo ;
Yan Fei ;
Yu FaJiang ;
Zhang LiQiang ;
Xu MingDi .
SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) :405-433