Netinfo Security ›› 2015, Vol. 15 ›› Issue (12): 28-33.doi: 10.3969/j.issn.1671-1122.2015.12.005

Previous Articles     Next Articles

Research on Security of Hybrid Cloud Based on Trusted Computing Technology

WU Jikang1(), YU Xuhong1, WANG Hong2   

  1. 1. Key Laboratory of Information and Computational Science of Guizhou Province, Guizhou Normal University,Guiyang Guizhou 550001, China
    2. The 309TH Hospital of Chinese Peole's Libertation Army 100091, China
  • Received:2015-08-15 Online:2015-12-20 Published:2016-01-04

Abstract:

In this paper, author analyzes the security problems of the hybrid cloud. Because of the openness of the hybrid cloud, cloud server management and external attackers can directly or indirectly get the user data, especially the user sensitive data, which causes the user's privacy data leakage and abuse. This paper gives a concrete operation steps: the identification of various applications and issues of the hybrid cloud, and then uses the full encryption algorithm to verify the server data and ensure the correct data hold; the authentication platform management user identity, users across the cloud without multiple authentication. Then the performance of the scheme is analyzed, which shows that the scheme is suitable for the general enterprises with little change. Finally, author analyzes the feasibility, data security, data availability, user privacy and security, efficiency and other indicators of the existing research programs are compared, which shows that the hybrid cloud security storage system has better advantages.

Key words: trusted computing technology, trusted computing platform, hybrid cloud, hybrid cloud security

CLC Number: