Abstract
Cloud computing is an important innovation of current computing models. At present, the research on the security of cloud computing is mainly concentrated on PCs and servers. The security of embedded system in cloud environment does not win enough attention. This paper analysis the security threats of it, and proposes a Secure Hardware Model to provide a tamper-resistant and more reliable hardware embedded platform in cloud environment. Our model adds some new components to traditional embedded system, controls the start sequence of platform’s components, verifies the integrity of crucial information for embedded platform and recovers the system if necessary. Our implementation demonstrates the feasibility of Secure Hardware Model, it enhance the secure and reliable boot of embedded system. With the constant development and application of embedded system in cloud computing field, our research will influence cloud computing greatly.
Publisher
Trans Tech Publications, Ltd.
Reference28 articles.
1. Gannon D: Head in the clouds. Nature, 449, (2007).
2. Shen Changxiang, Zhang Huanguo, Feng Dengguo, et al: Survey of Information Security. Science in China Series F, 50(3), pp.273-298, (2007).
3. Shen Changxiang, Zhang Huanguo, Wang Huaimin, et al. Research of Trusted Computing and its development. Science in China (information), 40, pp.139-166, (2010).
4. ZHAO Bo, ZHANG Huan-Guo, LI Jing, CHEN Lu, WEN Song. The System Architecture and Security Structure of Trusted PDA. Chinese Journal of Computers, 33(1), pp.82-92, (2010).
5. Xbox 360 hypervisor privilege escalation vulnerability, " on http: /www. honline. com/security/news/item/Xbox-360-hack-was-the-real-deal-732391. html. (2007).