Downloads: 106 | Views: 254
Research Paper | Computer Science & Engineering | China | Volume 4 Issue 11, November 2015 | Popularity: 6.3 / 10
Mutual Authentication Cloud Computing Platform based on TPM
Lei Peng, Yanli Xiao
Abstract: As cloud computing services appeared on the network in large numbers. The data and calculation of users are stored in the data center of cloud service provider, and of all kinds of resources are available for multiple users to share. Security gradually become an important issue in cloud computing. In order to ensure the security of cloud computing system and protect the users data security and privacy, the identity authentication mechanism between users and cloud computing server must be established. Currently, the technology of trusted computing has become the hotspot in the field of information security. The core of trusted computing is embedded in the terminal platform trusted platform module (TPM). In this paper, the trusted computing technology is applied in cloud computing services. Mutual authentication scheme based on TPM cloud computing platform is proposed. In this scheme it realizes the identity authentication between the users and the cloud computing server. The session key are negotiated to be generated, at the same time the trusted status of the cloud computing server platform is verified.
Keywords: cloud computing, trusted computing, trusted platform module, authentication
Edition: Volume 4 Issue 11, November 2015
Pages: 1446 - 1450
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022
Pages: 629 - 634A Face Spoof Detection using Feature Extraction and SVM
Lovely Pal, Renuka Singh
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, India, Volume 12 Issue 6, June 2023
Pages: 2966 - 2970Security in Kubernetes: A Comprehensive Review of Best Practices
Dinesh Reddy Chittibala
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia