Data exchange is a core part of all cloud systems
so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a
IaaS can easily perform some hidden and malicious
task on unsuspecting customer machine. This is
attributed to the fact that he/she possesses the root
privilege to do so and forms an attack. A cold boot
attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. There is a need to secure the computation state during communication and storage and we achieve this through the implementation of a trusted platform.

Project Samples

Project Activity

See All Activity >

Follow Implementing TCCP

Implementing TCCP Web Site

Other Useful Business Software
Simple, Secure Domain Registration Icon
Simple, Secure Domain Registration

Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
Sign up for free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Implementing TCCP!

Additional Project Details

Operating Systems

BSD, Linux

Languages

Chinese (Traditional), English, French

Intended Audience

Advanced End Users, Architects, Security Professionals

Registered

2012-05-19