Trusted Cloud Computing

Trusted Cloud Computing

DOI: 10.4018/978-1-5225-7924-3.ch002
OnDemand PDF Download:
No Current Special Offers


This chapter introduces various ideas to deal with insider attacks using the research directions, which are discussed in earlier chapters such as remote attestation, sealed storage, and integrity measurement. Trusted computing dependent on hardware root of trust has been produced by industry to secure computing frameworks and billions of end points. Remote attestation provides a facility to attestation the required platforms using platform configuration registers (PCR), and sealed storage is used to encrypt the consumer sensitive data using cryptographic operations. Integrity measurements are used to measure the given computing components in respective register. Here, the authors concentrated on a trusted computing paradigm to enable cloud service providers to solve the potential insider attacks at cloud premises.
Chapter Preview

Drawbacks In Traditional Computing

Even though the traditional computing served up as the kick starter the IT age or computer revolution and replaced the conventional paper file systems it has its own drawbacks. Some of the drawbacks are explained below.

Deployment of Traditional IT Services

When you deploy a new service, traditional IT necessitates that you buy another program for that service. Your organization pays a forthright expense, and afterward you possess this program. Enlisted IT personnel at that point load the program onto the computers in the framework, which can take some time contingent upon the idea of the service to be deployed and in addition the size and schedule of your IT group.

Upgrades in Traditional IT Service

Traditional IT requires your IT group to invest a lot of time and energy administrating an upgrade, upgrading methods that take significantly less time are needed.

Complete Chapter List

Search this Book: