Вы находитесь на странице: 1из 1

Cloud computing is an internet based development and use of computer technology.

Cloud computing provides people the way to share distributed resources and serv ices that belong to different organizations or sites. Since cloud computing shar e distributed resources via the network in the open environment, thus it makes s ecurity problems important for us to develop the cloud computing application. In this report, attention to the security requirements in cloud computing environm ent. It is a method to build a trusted computing environment for cloud computing system by integrating the trusted computing platform into cloud computing syste m. A model system in which cloud computing system is combined with trusted compu ting platform with trusted platform module. In this model, some important securi ty services, including authentication, confidentiality and integrity are in clou d computing system. The Cloud pertains to all the documents or files kept by servers from remote loc ations that can be accessed through the Internet. Storing data through the Cloud makes it easy for all the parties concerned to be able to retrieve the informat ion they need. Within the Cloud, users may be able to store and manage their fil es for personal use, or for other users to be able to utilize it. Cloud computin g is a catch-all phrase that covers virtualized operating systems running on vir tual hardware on untold numbers of physical servers. It is a paradigm where task s are assigned to a combination of connections, software and services accessed o ver a network. The cloud term has consumed High- Performance Computing, Grid computing and Utility Computing. Cloud Computing is envisioned as architecture of next generation enterprise. On the way to improve the security of cloud computing system using trusted computi ng technology. Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consis tently behave in expected ways, and those behaviors will be enforced by hardware and software. This mechanism is a good choice because the web service technolog y has been well established in the network-computing environment.

Вам также может понравиться