• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Wu, Lili (Wu, Lili.) | Zhan, Jing (Zhan, Jing.) | Zhao, Yong (Zhao, Yong.) | Hu, Jun (Hu, Jun.) | Li, Ming (Li, Ming.)

Indexed by:

EI Scopus

Abstract:

The characteristics of cloud computing, such as highly centralized resources, dynamic extensibility, and layered service mode, make the trusted evidence collection on the cloud platforms becomes very complex, this article introduces a trusted third party, and proposes a trusted evidence collection method based on the technology of trusted computing. Security features provided by TPCM (Trusted Platform Control Module) are used to introduce a CPTECA (Cloud Platform Trusted Evidence Collection Agent) in each layer of cloud platform respectively. The Agent monitors the entity in real-time using TPCM, and objectively collects the trusted evidence on the cloud Platform. Finally, the paper implements a CPTECA functional prototype based on the LSM (Linux Security Module). © 2016, UK Simulation Society. All rights reserved.

Keyword:

Computer operating systems Trusted computing Cloud computing Network security

Author Community:

  • [ 1 ] [Wu, Lili]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 2 ] [Wu, Lili]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 3 ] [Zhan, Jing]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 4 ] [Zhan, Jing]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 5 ] [Zhao, Yong]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 6 ] [Zhao, Yong]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 7 ] [Hu, Jun]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 8 ] [Hu, Jun]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 9 ] [Li, Ming]The Third Research Institute of Ministry of public security, Shanghai, China

Reprint Author's Address:

  • [wu, lili]beijing key laboratory of trusted computing, beijing university of technology, beijing, china;;[wu, lili]national engineering laboratory for critical technologies of information security classified protection, beijing university of technology, beijing, china

Email:

Show more details

Related Keywords:

Related Article:

Source :

International Journal of Simulation: Systems, Science and Technology

ISSN: 1473-8031

Year: 2016

Issue: 25

Volume: 17

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 5

Online/Total:592/10564436
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.