首页 | 本学科首页   官方微博 | 高级检索  
     检索      

浅析云计算的安全和可信计算的应用
引用本文:路璐,张剑妹.浅析云计算的安全和可信计算的应用[J].晋中师范高等专科学校学报,2014(3):82-84.
作者姓名:路璐  张剑妹
作者单位:长治学院计算机系,山西长治046011
摘    要:随着云计算的普遍应用,使云计算安全问题成为业界关注热点.用户在享受云计算提供的资源和计算等服务时,面临非法入侵和隐私泄露等威胁.为了解决云计算安全问题,需要建立一种安全可信机制,保障系统和应用的安全性.把可信计算技术应用到终端设备上,从"信任根"出发,借助"信任链"把可信逐级传递下去,最终扩展到整个终端计算系统都是安全可信的.

关 键 词:云计算  安全  可信计算  TPM

Analysis on Security of Cloud Computing and Application of Trusted Computing
LU Lu,ZHANG Jian-mei.Analysis on Security of Cloud Computing and Application of Trusted Computing[J].Journal of Jinzhong Teachers College,2014(3):82-84.
Authors:LU Lu  ZHANG Jian-mei
Institution:(Department of Computer Science, Changzhi University, Changzhi Shanxi, 046011 China)
Abstract:With the widespread use of cloud computing,the industry has focused on its security issues.As users are enjoying other resources and services provided by cloud computing,they face the illegal invasion and loss of privacy threats.In order to solve the problem of cloud computing security issues,they need to establish a safe and reliable mechanism to protect the security of the system and applications.The trusted computing technology is applied to the terminal device,starting with the "root of trust"by the"chain of trust"to pass on credible step by step,eventually makes the whole computing systems safe and reliable.
Keywords:cloud computing  safety  trusted computing  TPM
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号