浅析云计算的安全和可信计算的应用  被引量:1

Analysis on Security of Cloud Computing and Application of Trusted Computing

在线阅读下载全文

作  者:路璐[1] 张剑妹[1] 

机构地区:[1]长治学院计算机系,山西长治046011

出  处:《晋中学院学报》2014年第3期82-84,共3页Journal of Jinzhong University

摘  要:随着云计算的普遍应用,使云计算安全问题成为业界关注热点.用户在享受云计算提供的资源和计算等服务时,面临非法入侵和隐私泄露等威胁.为了解决云计算安全问题,需要建立一种安全可信机制,保障系统和应用的安全性.把可信计算技术应用到终端设备上,从"信任根"出发,借助"信任链"把可信逐级传递下去,最终扩展到整个终端计算系统都是安全可信的.With the widespread use of cloud computing,the industry has focused on its security issues.As users are enjoying other resources and services provided by cloud computing,they face the illegal invasion and loss of privacy threats.In order to solve the problem of cloud computing security issues,they need to establish a safe and reliable mechanism to protect the security of the system and applications.The trusted computing technology is applied to the terminal device,starting with the "root of trust"by the"chain of trust"to pass on credible step by step,eventually makes the whole computing systems safe and reliable.

关 键 词:云计算 安全 可信计算 TPM 

分 类 号:TP391.9[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象