A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers

A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers

Arun Fera M., M. Saravanapriya, J. John Shiny
Copyright: © 2019 |Pages: 13
ISBN13: 9781522581765|ISBN10: 1522581766|EISBN13: 9781522581772
DOI: 10.4018/978-1-5225-8176-5.ch022
Cite Chapter Cite Chapter

MLA

M., Arun Fera, et al. "A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers." Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 446-458. https://doi.org/10.4018/978-1-5225-8176-5.ch022

APA

M., A. F., Saravanapriya, M., & Shiny, J. J. (2019). A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers. In I. Management Association (Ed.), Cloud Security: Concepts, Methodologies, Tools, and Applications (pp. 446-458). IGI Global. https://doi.org/10.4018/978-1-5225-8176-5.ch022

Chicago

M., Arun Fera, M. Saravanapriya, and J. John Shiny. "A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers." In Cloud Security: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 446-458. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-8176-5.ch022

Export Reference

Mendeley
Favorite

Abstract

Cloud computing is one of the most vital technology which becomes part and parcel of corporate life. It is considered to be one of the most emerging technology which serves for various applications. Generally these Cloud computing systems provide a various data storage services which highly reduces the complexity of users. we mainly focus on addressing in providing confidentiality to users' data. We are proposing one mechanism for addressing this issue. Since software level security has vulnerabilities in addressing the solution to our problem we are dealing with providing hardware level of security. We are focusing on Trusted Platform Module (TPM) which is a chip in computer that is used for secure storage that is mainly used to deal with authentication problem. TPM which when used provides a trustworthy environment to the users. A detailed survey on various existing TPM related security and its implementations is carried out in our research work.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.