A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers

A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers

Arun Fera M, M. Saravanapriya, J. John Shiny
ISBN13: 9781522517856|ISBN10: 1522517855|EISBN13: 9781522517863
DOI: 10.4018/978-1-5225-1785-6.ch014
Cite Chapter Cite Chapter

MLA

M, Arun Fera, et al. "A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers." Handbook of Research on Recent Developments in Intelligent Communication Application, edited by Siddhartha Bhattacharyya, et al., IGI Global, 2017, pp. 366-379. https://doi.org/10.4018/978-1-5225-1785-6.ch014

APA

M, A. F., Saravanapriya, M., & Shiny, J. J. (2017). A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers. In S. Bhattacharyya, N. Das, D. Bhattacharjee, & A. Mukherjee (Eds.), Handbook of Research on Recent Developments in Intelligent Communication Application (pp. 366-379). IGI Global. https://doi.org/10.4018/978-1-5225-1785-6.ch014

Chicago

M, Arun Fera, M. Saravanapriya, and J. John Shiny. "A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers." In Handbook of Research on Recent Developments in Intelligent Communication Application, edited by Siddhartha Bhattacharyya, et al., 366-379. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1785-6.ch014

Export Reference

Mendeley
Favorite

Abstract

Cloud computing is one of the most vital technology which becomes part and parcel of corporate life. It is considered to be one of the most emerging technology which serves for various applications. Generally these Cloud computing systems provide a various data storage services which highly reduces the complexity of users. we mainly focus on addressing in providing confidentiality to users' data. We are proposing one mechanism for addressing this issue. Since software level security has vulnerabilities in addressing the solution to our problem we are dealing with providing hardware level of security. We are focusing on Trusted Platform Module (TPM) which is a chip in computer that is used for secure storage that is mainly used to deal with authentication problem. TPM which when used provides a trustworthy environment to the users. A detailed survey on various existing TPM related security and its implementations is carried out in our research work.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.