Study on the Design of Trusted Secure Cloud System Structure

Article Preview

Abstract:

The ordinary cloud system is confronted with various threats in trust and security perspective, which have influenced the extensive use of cloud system. Aiming at the defects in the trusted secure design of the ordinary cloud system frame, a trusted secure cloud system has been designed.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1444-1449

Citation:

Online since:

September 2013

Authors:

Export:

Price:

[1] Li Hong, Li Hao, Key Technology and Realization of Trusted Cloud Security, (Beijing. Posts and Telecom Press, 2010).

Google Scholar

[2] Zou Deqing, Jiang Weizhong, Jin Hai, Principle and Application of Trusted Computing Technology (Science Press. 2011).

Google Scholar

[3] Wang Laifu, Shen Jun, Jin Huamin, Research on Cloud Computing Security, Telecommunications Science, 2010(6): 66-70.

Google Scholar

[4] Xue Kai, Liu Chao, Yang Shuguo, Research on Secure Frame of Cloud Computing, Computer & Telecommunication, 2010 (4): 28-32.

Google Scholar

[5] Zheng Hua, A Development Model for Domain-Oriented Information Service Based On Cloud Computing Infrastructure, Journal of Theoretical and Applied Information Technology, Vol. 46, No. 2, pp.0594-0598 , (2012).

Google Scholar