مشخصات مقاله | |
ترجمه عنوان مقاله | دسترسی متمرکز ماشین مجازی (VM) برای محاسبات ابری قابل اعتماد توزیع شده |
عنوان انگلیسی مقاله | Centralized Accessibility of VM for Distributed Trusted Cloud Computing |
نشریه | آی تریپل ای – IEEE |
سال انتشار | 2023 |
تعداد صفحات مقاله انگلیسی | 6 صفحه |
هزینه | دانلود مقاله انگلیسی رایگان میباشد. |
مقاله بیس | این مقاله بیس نمیباشد |
نوع مقاله | ISI |
فرمت مقاله انگلیسی | |
فرضیه | ندارد |
مدل مفهومی | ندارد |
پرسشنامه | ندارد |
متغیر | ندارد |
رفرنس | دارد |
رشته های مرتبط | مهندسی کامپیوتر – مهندسی فناوری اطلاعات |
گرایش های مرتبط | رایانش ابری – هوش مصنوعی – مهندسی الگوریتم ها و محاسبات – اینترنت و شبکه های گسترده – شبکه های کامپیوتری |
نوع ارائه مقاله |
کنفرانس |
مجله / کنفرانس | کنفرانس بین المللی محاسبات، ریاضیات و فناوری های مهندسی – International Conference on Computing, Mathematics and Engineering Technologies |
دانشگاه | Department of Computer Science, The Shaikh Ayaz University, Shikarpur, Sindh, Pakistan |
کلمات کلیدی | محاسبات ابری مورد اعتماد – مدل های اعتماد توزیع شده – یکپارچگی ماشین مجازی |
کلمات کلیدی انگلیسی | Trusted Cloud computing – Distributed Trust Models – Virtual machine integrity |
شناسه دیجیتال – doi |
https://doi.org/10.1109/iCoMET57998.2023.10099351 |
لینک سایت مرجع |
https://ieeexplore.ieee.org/document/10099351 |
کد محصول | e17446 |
وضعیت ترجمه مقاله | ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید. |
دانلود رایگان مقاله | دانلود رایگان مقاله انگلیسی |
سفارش ترجمه این مقاله | سفارش ترجمه این مقاله |
فهرست مطالب مقاله: |
Abstract I Introduction II Literature Review III Methodology Future Work Conclusion Authors Figures References |
بخشی از متن مقاله: |
Abstract Cloud computing platforms constructed on Trusted Computing Technology are commonly referred to as trusted cloud computing. The core component of this technology is known as Trusted Platform Module (TPM). Its specifications are given by the consortium known as Trusted Computing Group (TCG). Though TPM is an immovable module and is fixed inside any computer, yet its credentials can be shared with other devices. This paper presents the accessibility model for Virtual Machine (VM) of a distributed trust protocol which is based on TPM, through which consumer’s credentials are shared to other trusted devices. These credentials essentially describe the integrity of VM.
Introduction Cloud computing is a new way of outsourcing IT services as an online service. Although varying to the field of distributed, cluster or grid computing the use of the Internet in cloud computing separates it from the cluster and the grid computation. As per the terminology of cloud computing implies, the word cloud refers to the Internet that rawhides the basic enigmas of cloud computing users and conveys the seamless thinking of accepting Information Communication Technology (ICT) computation facilities from the cloud service provider (CSP). The domain of cloud computing includes three components namely Cloud Infrastructure, Cloud Provider and Cloud Consumer. Cloud computing services are used in other forms of conveyance such as Software as a Service, Platform as a Service and infrastructure as a service. According the definition of SaaS, code and databases furnished to several clients. In PaaS, software development platform is provided. IaaS allows the consumer to produce a complete and fully functional virtual machine with network capability, data storage devices, CPU or GPU processing, run time memory and almost all other resources needed for integration.
Cloud services can be used likewise we use utilities in our daily life i.e. pay what you use. IaaS model is a fundamental layer for the cloud environment. At this layer computing resources are designed for virtualization purposes, in order to achieve widespread distribution and deployment. Due to high deployment, there is a high risk of security attacks and it is very difficult for a cloud buyer to rely on such a multitenant site. Cloud computing and IaaS security issues such as data security and privacy, trust, multiple tenants, damage, and data leaks, malicious VM etc are shown in [2] and [3]. Caring these issues it is very difficult for the consumer to rely on the infrastructure provided to the consumer. User stores data in bought machines (VM) swung on the provider facet for processing and other purposes. It is important to examine the cloud equipment for privateness and integrity before, after and at some stage in VM implementation. The literature reviewed for this motive conveys the clean impact that there may be a loss of such structures that permit the user to discover a VM controlled with integrity and privateness. In the IaaS framework all environmental safety measures are done via way of means of the provider, so the user ought to depend now no longer best on his or her infrastructure however additionally on his or her personal countermeasures Conclusion Cloud computing is an internet-centric technology for outsourcing IT services such as software, platform, and infrastructure. In this research work accessibility model for the guest VM is proposed. In the proposed model integrity values of guest VM are shared and synchronized with more than one authenticated client devices to access the guest VM from everywhere and anywhere. |