• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Wu, Lili (Wu, Lili.) | Zhan, Jing (Zhan, Jing.) | Zhao, Yong (Zhao, Yong.) | Hu, Jun (Hu, Jun.) | Li, Ming (Li, Ming.)

收录:

EI Scopus

摘要:

The characteristics of cloud computing, such as highly centralized resources, dynamic extensibility, and layered service mode, make the trusted evidence collection on the cloud platforms becomes very complex, this article introduces a trusted third party, and proposes a trusted evidence collection method based on the technology of trusted computing. Security features provided by TPCM (Trusted Platform Control Module) are used to introduce a CPTECA (Cloud Platform Trusted Evidence Collection Agent) in each layer of cloud platform respectively. The Agent monitors the entity in real-time using TPCM, and objectively collects the trusted evidence on the cloud Platform. Finally, the paper implements a CPTECA functional prototype based on the LSM (Linux Security Module). © 2016, UK Simulation Society. All rights reserved.

关键词:

Cloud computing Computer operating systems Network security Trusted computing

作者机构:

  • [ 1 ] [Wu, Lili]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 2 ] [Wu, Lili]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 3 ] [Zhan, Jing]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 4 ] [Zhan, Jing]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 5 ] [Zhao, Yong]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 6 ] [Zhao, Yong]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 7 ] [Hu, Jun]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, China
  • [ 8 ] [Hu, Jun]National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing University of Technology, Beijing, China
  • [ 9 ] [Li, Ming]The Third Research Institute of Ministry of public security, Shanghai, China

通讯作者信息:

  • [wu, lili]beijing key laboratory of trusted computing, beijing university of technology, beijing, china;;[wu, lili]national engineering laboratory for critical technologies of information security classified protection, beijing university of technology, beijing, china

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

International Journal of Simulation: Systems, Science and Technology

ISSN: 1473-8031

年份: 2016

期: 25

卷: 17

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:409/2894864
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司