Abstract

In the context of Trusted Attestation System in Cloud Computing Environment the Root of Trust for Attestation plays a vital role for security feature with Trusted Computing. The main aim of trusted attestation process is to provide an effective mechanism for the interconnected public and private systems in a well secured platform using Trusted Platform Module. The mechanism created by the trusted attestation phase gains assurance about data integrity and trustworthiness. The Trusted Attestation System enables the trusted computing functionalities for all authorized users in the current working environment. The Cloud Computing Environment extends the failure rate as attacks on public data and private data for the trusted system. The authenticated integrity state of a trusted system involves the Root of Trust for Attestation (RTA). In the cloud environment an attested user is trusted to behave with the available standard technologies like management of identity, digital signatures, exchange of credential, certificates and management of key. The trusted attestation system in the cloud environment provides Trust as a service (TaaS) for the generation of key. The credential exchange for the trusted environment enhances the facility for Cloud Computing Environment (CCE).

Highlights

  • Cloud Computing aims at providing dynamic scalability computing resources over the Internet as a Service [5]

  • Trusted Computing is a new platform for providing security which has been modeled by the Trusted Computing Group (TCG) [1] based on Trusted Platform Module (TPM) [2]

  • In the proposed enhanced trusted attestation process the key generated for credential exchange is more vulnerable

Read more

Summary

Introduction

Cloud Computing aims at providing dynamic scalability computing resources over the Internet as a Service [5]. The attacks on data confidentiality and data integrity enable hackers to thwart the important data In this context the trustworthiness of a platform for cloud computing environment is defined and verified with some fundamental and challenging issues. The TPM signs to guarantee trustworthiness and freshness of characteristics which are needed It serves as Root of Trust for Attestation (RTA) in Trusted Computing. RTA is for vouching the accuracy of the information and protecting the privacy of the host of the TPM.TCG develops a solution using a trusted attester (Privacy CA) by securing Enhanced Trusted Attestation Key (ETAK) certificated by Privacy CA and signs the message by using TAK. Rajalakshmi: Trusted Attestation System for Cloud Computing Environment Using Trusted Platform Module users. The Root of Trust for Attestation (RTA) is to attest the computing environment more trustworthy

Architecture of Trusted Computing Environment
Architecture of TPM
Various Types of Related Trust
Proposed Methodology
User Level Trusted Attestation Process
Machine Level Trusted Attestation Process
Attestation for Trusted System
Credentials forTrustasa Service
Enhancement of Trusted Attestation Key
Trust of Signer and Verifier
Conclusion and Future Enhancement
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call