Data Security in Cloud Based on Trusted Computing Environment
Vijay .G.R1 A.Rama Mohan Reddy2

1Vijay.G.R, PHD Scholar, Department of Computer Science & Engg, JNTUA, Anantapur, A.P, India.
2Dr.A.Rama Mohan Reddy, Professor, Deptarment of CSE, SVU College of Engineering, Tirupati, A.P, India.
Manuscript received on February 04, 2013. | Revised Manuscript received on February 26, 2013. | Manuscript published on March 05, 2013. | PP: 187-191 | Volume-3 Issue-1, March 2013. | Retrieval Number: A1343033113/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: HIn recent years Cloud Computing has become one of the growing fields in computer science. In which the security problem of cloud computing has become a hot research topic. It must be verified in the trusted status of the platform which actually carries out the computing task in the cloud, and the remote mechanism in Trusted Computing is suited for the cloud user’s verification need. This paper briefly sketches out the method to build a Trusted Computing Environment for cloud computing system by integrating the Trusted Computing Platform (TCP) with Trusted Platform Module (TPM) into the security of cloud computing system. The RC4 stream cipher algorithm is most used algorithm to provide the confidentiality over the different networks. In this paper we propose the discussion of Simulation Results with its Analysis and the Performance Evaluation with the representation of data and time.
Keywords: Cloud Computing, TCP, TCM, Trusted Computing, RC-4.