This book focuses on the security issues in Cloud Computing System; Cloud Computing is an upcoming paradigm that offers tremendous advantages in economical aspects such as reduced time to market, flexible computing capabilities and limitless computing power. To use the full potential of the cloud computing, data is transferred, processed and stored by external cloud providers. However, data owners are very skeptical to place their data outside their own control sphere. This book discusses the security controls to protect data in cloud computing environment using Cryptographic technique.
Cloud computing provide the way to share distributed resources and services that belong to different organizations. Since cloud computing share distributed resources via the network in the open environment, thus it makes security problems important for us to develop the cloud computing application. In this book, we pay attention to the security requirements in cloud computing environment. We proposed a method to build a trusted computing environment using cryptographic technique, for cloud computing system by integrating the trusted computing platform into cloud computing system. Security has become a major concern in cloud computing environment. Where the resources are shared by many. Users join and leave the cloud dynamically which leads to a serious challenge for the security of shared resources. Hence there’s a need to establish trust in the cloud so that the users are ensured of their data security. We propose a model system in which cloud computing system is combined with trusted computing platform with trusted platform module. In this model, some important security services, including authentication, confidentiality, data Storage, data security and access control, are provided in cloud computing system.
Inhaltsverzeichnis (Table of Contents)
- CHAPTER 1
- INTRODUCTION
- 1.1 Product prospective
- 1.2 Objectives
- CHAPTER 2
- MATERIALS AND METHODS
- 2.1 Cloud Computing System
- 2.2 Architecture of Cloud Computing System
- 2.3 Security of Cloud Computing System Architecture
- 2.4 A Trusted Cloud Computing with Cryptographic technique
- 2.5 Implementation Tools
- 2.6 Implementation procedure for TCCT with CGT
- CHAPTER 3
- RESULT AND DISCUSSION
- CHAPTER 4
- SUMMARY AND CONCLUSION
- REFERENCES
Zielsetzung und Themenschwerpunkte (Objectives and Key Themes)
This book aims to address security concerns within the cloud computing environment. The authors highlight the benefits of cloud computing, particularly cost-effectiveness, flexibility, and scalability. However, they recognize the data security concerns that arise from outsourcing data management to external cloud providers. The book explores the implementation of cryptographic techniques to enhance trust and data security in cloud computing. Key themes addressed in the book include: * **Cloud Computing Security:** The text focuses on securing data in the cloud computing environment. * **Cryptographic Techniques:** The book proposes the use of cryptographic techniques as a solution to secure cloud computing systems. * **Trusted Computing Platform:** The book integrates a Trusted Computing Platform (TCP) with a Trusted Platform Module (TPM) into the cloud computing system to enhance security. * **Data Security and Access Control:** The book addresses the importance of securing data storage, confidentiality, and access control within the cloud computing environment. * **Authentication:** The authors explore authentication methods to ensure the security of data and user access within the cloud.Zusammenfassung der Kapitel (Chapter Summaries)
Chapter 1: Introduction
Chapter 1 introduces the concept of cloud computing, outlining its benefits and challenges. It emphasizes the significance of security in cloud computing, given the shared and distributed nature of resources. The authors highlight the need for trust between users and cloud providers to ensure data security. They introduce "A Trusted Cloud Computing with Cryptographic Technique" as a potential security solution.Chapter 2: Materials and Methods
Chapter 2 delves into the architecture of cloud computing systems and explores the security implications of this architecture. It presents the authors' proposed method for building a trusted computing environment within cloud systems using cryptographic techniques. This chapter also discusses the implementation tools and procedures used for the proposed solution.Chapter 3: Result and Discussion
Chapter 3 presents the results of the proposed approach, exploring the effectiveness of cryptographic techniques in enhancing cloud computing security. This chapter provides a detailed analysis and discussion of the findings, highlighting the strengths and limitations of the proposed model.Chapter 4: Summary and Conclusion
Chapter 4 offers a concise summary of the book's key findings and contributions. It provides a concluding perspective on the importance of trusted computing platforms and cryptographic techniques for improving cloud computing security.Schlüsselwörter (Keywords)
This book centers around the intersection of cloud computing and security, exploring the implementation of cryptographic techniques to enhance trust and data security in cloud environments. Key terms and concepts include: cloud computing, security, cryptographic techniques, trusted computing platform, trusted platform module, data security, authentication, access control, and data storage.- Quote paper
- Raja Praveen.k.n (Author), 2013, A Trusted Cloud Computing With Cryptographic Technique, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/262478