IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers

A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers
View Sample PDF
Author(s): Arun Fera M (Thiagarajar College of Engineering, India), M. Saravanapriya (Thiagarajar College of Engineering, India)and J. John Shiny (Thiagarajar College of Engineering, India)
Copyright: 2017
Pages: 14
Source title: Handbook of Research on Recent Developments in Intelligent Communication Application
Source Author(s)/Editor(s): Siddhartha Bhattacharyya (RCC Institute of Information Technology, India), Nibaran Das (Jadavpur University, India), Debotosh Bhattacharjee (Jadavpur University, India)and Anirban Mukherjee (RCC Institute of Information Technology, India)
DOI: 10.4018/978-1-5225-1785-6.ch014

Purchase

View A Comprehensive Survey on Techniques Based on TPM for Ensuring the Confidentiality in Cloud Data Centers on the publisher's website for pricing and purchasing information.

Abstract

Cloud computing is one of the most vital technology which becomes part and parcel of corporate life. It is considered to be one of the most emerging technology which serves for various applications. Generally these Cloud computing systems provide a various data storage services which highly reduces the complexity of users. we mainly focus on addressing in providing confidentiality to users' data. We are proposing one mechanism for addressing this issue. Since software level security has vulnerabilities in addressing the solution to our problem we are dealing with providing hardware level of security. We are focusing on Trusted Platform Module (TPM) which is a chip in computer that is used for secure storage that is mainly used to deal with authentication problem. TPM which when used provides a trustworthy environment to the users. A detailed survey on various existing TPM related security and its implementations is carried out in our research work.

Related Content

Kamel Mouloudj, Vu Lan Oanh LE, Achouak Bouarar, Ahmed Chemseddine Bouarar, Dachel Martínez Asanza, Mayuri Srivastava. © 2024. 20 pages.
José Eduardo Aleixo, José Luís Reis, Sandrina Francisca Teixeira, Ana Pinto de Lima. © 2024. 52 pages.
Jorge Figueiredo, Isabel Oliveira, Sérgio Silva, Margarida Pocinho, António Cardoso, Manuel Pereira. © 2024. 24 pages.
Fatih Pinarbasi. © 2024. 20 pages.
Stavros Kaperonis. © 2024. 25 pages.
Thomas Rui Mendes, Ana Cristina Antunes. © 2024. 24 pages.
Nuno Geada. © 2024. 12 pages.
Body Bottom