• Jun 13, 2017 News!The submission for 2018 7th International Conference on Information and Electronics Engineering (ICIEE 2018) is officially open now !   [Click]
  • Jul 28, 2017 News!IJIEE Vol. 7, No. 4 issue has been published online!   [Click]
  • Jun 28, 2017 News!Papers published in Vol.7, No.1 have all received dois from Crossref.
General Information
Editor-in-chief

 
Faculty of Science, University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, IJIEE will be recognized among the readers in the related field."
IJIEE 2012 Vol.2(4): 644-648 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2012.V2.179

Attestation for Trusted Computing to Assure Security in Cloud Deployment Services

Udhayakumar Shanmugam, Latha Tamilselvan, Uma Nandhini, and Dhinakaran
Abstract—Enforcing a behavioral pattern in any system will force it to behave in the expected way thorough which it can be secured against any unauthorized access leading to a trusted environment. Security assurance in cloud computing environment is a major challenge associated with lack of trust and vulnerability to unauthenticated access that requires the providers to secure virtualized data centers by preserving data integrity. To improve the customer’s confidence on cloud, trust has to be restored by developing trusted computing model for various cloud services ranging from storage, network, and infrastructure to everything as a service. Current trends suggest that the digital world is going to be more and more flexible, interconnected and open to public access and hence the trust associated with it has to be managed based on variety of key security techniques like identity management, digital signatures, credential exchange, certificates and key management. Nevertheless attacks on public as well as private data’s in cloud ecosystem exposes the inherent failure in protection mechanism. This paper proposes an attestation server that defines the functionality and measures the behavioral pattern of hypervisor, BIOS, boot devices and other operating system modules to verify it with good/known databases to determine nodes trustworthiness. Also provides an understanding of various attestation models and standards that justify that attestation as a service is a trustworthy mechanism to enable an ordinary platform to behave as a trusted computing platform.

Index Terms—Attestation, trust, cloud computing, reputation, digital signature, virtual machine.

Udhayakumar Shanmugam, Latha Tamilselvan, and Uma Nandhini are with the School of Computer and Information Sciences B.S.Abdur Rahman University, Vandalur, Chennai, India (e-mail: mailudhay@yahoo.com). Dhinakaran is with the Sri Venkateswara College of Engineering, Sriperambadur, Chennai, Inia.

[PDF]

Cite: Udhayakumar Shanmugam, Latha Tamilselvan, Uma Nandhini, and Dhinakaran, "Attestation for Trusted Computing to Assure Security in Cloud Deployment Services," International Journal of Information and Electronics Engineering vol. 2, no. 4, pp. 644-648, 2012.

Copyright © 2008-2017. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net