晋中学院学报
晉中學院學報
진중학원학보
JOURNAL OF JINZHONG UNIVERSITY
2014年
3期
82-84
,共3页
云计算%安全%可信计算%TPM
雲計算%安全%可信計算%TPM
운계산%안전%가신계산%TPM
cloud computing%safety%trusted computing%TPM
随着云计算的普遍应用,使云计算安全问题成为业界关注热点。用户在享受云计算提供的资源和计算等服务时,面临非法入侵和隐私泄露等威胁。为了解决云计算安全问题,需要建立一种安全可信机制,保障系统和应用的安全性。把可信计算技术应用到终端设备上,从“信任根”出发,借助“信任链”把可信逐级传递下去,最终扩展到整个终端计算系统都是安全可信的。
隨著雲計算的普遍應用,使雲計算安全問題成為業界關註熱點。用戶在享受雲計算提供的資源和計算等服務時,麵臨非法入侵和隱私洩露等威脅。為瞭解決雲計算安全問題,需要建立一種安全可信機製,保障繫統和應用的安全性。把可信計算技術應用到終耑設備上,從“信任根”齣髮,藉助“信任鏈”把可信逐級傳遞下去,最終擴展到整箇終耑計算繫統都是安全可信的。
수착운계산적보편응용,사운계산안전문제성위업계관주열점。용호재향수운계산제공적자원화계산등복무시,면림비법입침화은사설로등위협。위료해결운계산안전문제,수요건립일충안전가신궤제,보장계통화응용적안전성。파가신계산기술응용도종단설비상,종“신임근”출발,차조“신임련”파가신축급전체하거,최종확전도정개종단계산계통도시안전가신적。
With the widespread use of cloud computing, the industry has focused on its security issues. As users are enjoying other resources and services provided by cloud computing, they face the illegal invasion and loss of privacy threats. In order to solve the problem of cloud computing security issues, they need to establish a safe and reliable mechanism to protect the security of the system and applications. The trusted computing technology is applied to the terminal device, starting with the “root of trust”by the“chain of trust”to pass on credible step by step, eventually makes the whole computing systems safe and reliable.