Dependable security cloud computing composition method

A trusted computing and trusted cloud technology, applied in electrical components, user identity/authority verification, transmission systems, etc., can solve problems such as being unable to adapt to cloud computing without borders

Inactive Publication Date: 2014-05-21
XIAMEN ONETS INFORMATION TECH
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The normal operation of the cloud computing system and the security and management protection of sensitive data are related to national security and social stability. The current trusted computing and cloud security defense models are based on different security requirements in terms of confidentiality, integrity, controllability and other security aspects. The emphases are different, and traditional border security measures cannot meet the requirements of borderless and hostless for cloud computing.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dependable security cloud computing composition method
  • Dependable security cloud computing composition method
  • Dependable security cloud computing composition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0007] 1. System components.

[0008] 1. Development of isolation machine based on virtual machine: the VMM layer runs directly on the hardware layer, and each guest operating system runs on the VMM layer. Multiple guest virtual machines with their own operating systems and applications.

[0009] 2. Remote platform authentication and identity management based on TPCM or TPM: replace the unique endorsement key EK of TPCM with the identity certificate key AIK to sign the platform configuration register PCR, and provide the service provider with the identity certificate of the platform. One TPCM or TPM can have multiple AIKs. The process of issuing a virtual platform identity key AIK certificate for the TPM:

[0010] ①The physical TPCM first generates an AIK, which is a 2048-bit RSA key pair.

[0011] ②The physical platform requests the AIK certificate from a certificate server, and the request includes the AIK public key, the certificate of the cryptographic module key EK and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a dependable virtual technical idea by combining dependable computing and virtualization technology. A source is consistently started from, platform starting security dependability, program controllability and manageability and security confidentiality in data processing and storage are started, and a 'dependable security cloud computing system' is developed. System dependability, program dependability and data security of cloud computing platform users are facilitated, the system has a high practical value, and data privacy is protected.

Description

Technical field: [0001] This system controls, tracks and protects the entire life cycle of the generation, storage, transmission, use and destruction of various confidential data information in cloud computing, using trusted computing technology, virtual machine technology, trusted computing technology, trusted storage technology to ensure the originality of the equipment, the integrity and originality of the program. Background technique: [0002] The normal operation of the cloud computing system and the security and management protection of sensitive data are related to national security and social stability. The current trusted computing and cloud security defense models are based on different security requirements in terms of confidentiality, integrity, controllability and other security aspects. The emphases are different, and traditional border security measures cannot meet the borderless and hostless requirements for cloud computing. Combining trusted computing and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L9/32
Inventor 韩永飞
Owner XIAMEN ONETS INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products