SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
International Journal of Research and Reviews in Information Sciences (IJRRIS)
Vol. 1, No. 3, September 2011, ISSN: 2046-6439
© Science Academy Publisher, United Kingdom
www.sciacademypublisher.com

74

A Trusted Virtual Private Space Model for Enhancing the Level
of Trust in Cloud Computing Technology
Sarfraz Nawaz Brohi
Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia
Email: sarfraz_brohi@hotmail.com

Abstract – Gartner Inc, one of the world’s leading technology research companies highlighted the list of top ten technologies
and trends that will be strategic for most IT organizations in 2010. Cloud computing rules the list of technologies with its
placement at number one position. Cloud computing is not only about a software that is accessed remotely but it is an
innovative paradigm of utilizing the IT resources efficiently and effectively. Cloud computing removes the burden of
managing the technology from the client’s side. Clients are just concerned with the utilization of IT resources without being
concerned about management processes. With the usage of cloud computing the storage of clients is maintained at the data
center under the security of cloud provider. Nowadays a common question arises is how to trust the provider. Trust is one of
the emerging issues that have created barriers between technology of cloud computing and its clients/users. In an objective to
enhance the trust in cloud computing technology, this research paper introduces a technique of virtual private space model that
is consists of a trust protocol.
Keywords – Trust Protocol, Virtual Private Space Model, Security

1.

Introduction

Cloud computing is an emerging technology due to its
cost effective benefits. With the exploit of this technology
clients are proficient to access several computing resources
such as applications, computing platforms and datacenters as
on-demand services. Cloud providers are facilitating the
clients mainly with three types of services, Software as a
Service (SaaS), Platform as a Service (PaaS) and
Infrastructure as a Service (IaaS). SaaS refers to the running
applications that are provided to the clients as a service.
These applications can be accessed through a thin layer
interface such as a web-browser. Due to the use of SaaS
clients don’t need to install and buy licensed applications,
they just need to follow the pay-per-use pattern. However
SaaS is not fully reliable when it comes to the use of realtime applications such as 3D games. These applications
require buffering time, so their performance becomes slower
when users access through internet.
PaaS is the delivery of a computing platform over the web
as a service. PaaS enables the clients to create web
applications rapidly without the cost and complexity of
buying and managing the underlying software/hardware. IaaS
is the delivery of huge computing resources such as the
capacity of processing, storage and network. It enables the
clients to use virtual software, hardware, datacenter and
networking components as on-demand services. The clients
are not required to purchase disks or other storage devices
[1]. It seems to be that cloud computing is on its approach to
remove the need of hardware devices and licensed
applications. In the near future clients will be able to use
software such as word processing applications, operating
systems without the need of heavy hardware devices, as the
client system doesn’t need to process these applications [2].

Beside the numerous advantages of cloud computing it
should be also considered that sometimes cloud can be rainy
as well. In other words security on cloud is not trustworthy.
When data of a client is on the datacenter of third party cloud
provider, there are obvious chances of security, hack, theft
and malicious activities that can be performed by illegal users
such as hackers. In order to contribute in the research field of
cloud computing, this research paper discusses a trusted
cloud model that will provide the security for virtual machine
(VM) of each client on cloud without affecting the
performance of required service.

2.

Trust: A Challenge in Cloud Computing

In the cloud computing architecture, the communication
link is between the clients and a provider, where clients are
engaged in the usage of resources without being concerned
about maintenance and security issues. In the traditional
architecture of cloud computing the main issue faced was that
if any malicious activity affected the storage of one client. It
will also affect the storage of other clients that are relying on
same hardware and operating platform [3]. Somehow, this
issue is now solved by adopting the technique of
virtualization where data of each client is stored on an
isolated VM, so if any malicious activity detected in the VM
of one client, it will not influence the VM of other clients.
The virtualization technique brought up few advantages such
as isolating the operating platforms and reducing the amount
of required hardware devices, however it incurs the issues of
security. Using the virtualization concept in cloud computing,
cloud providers are able to store the data of clients on
isolated VMs but data is stored on the cloud with the provider
so clients do not feel sense of control on their personal data.
Normally the clients such as Banking or Healthcare sectors
Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 74-76, September 2011

where confidentiality of information is a vital task, these
clients are not ready to adopt the paradigm of cloud
computing due to the risk of trust. In virtualization, there is
challenge regarding to the trust on the provider because the
task of maintaining the security of VM is fully under the
responsibility of cloud provider so clients don’t fully trust on
the provider. They believe provider may leak out their
customers personal records [3].
In order to deeply clarify the trust issue in the cloud
computing, consider an example of an owner of shopping
mall and tenants. For-example a shopping mall is given to the
tenants on rental, where they are required to pay according to
the usage of resources such as rental for the shop, but security
and maintenance will be provided by the owner. Tenants are
not responsible about security and maintenance so it saves
cost and time for them. On the other hand, security keys are
only with the owner. When tenants are saving all their
personal resources inside the shopping mall of a third party
owner, the issue is that how to trust that their resources will
be safe without any security threats.
Now apply the same scenario on cloud computing,
suppose the owner of the mall is the cloud provider such as
Google, Amazon or Microsoft and tenants are the cloud
clients such as HealthCare and Banking organizations. The
clients will use the datacenters of cloud provider and if
security is under the management of cloud provider, clients
are not confident enough to trust the provider because their
information is very critical, so it is a challenging task to
provide trust to the clients where information is very critical.
If security is shared between the clients and a provider, forexample provider manages the security of overall datacenter
to ensure that no one can threat the security of client’s VMs
and other part of security is managed by the clients such as
clients are acquiring secret encryption locks to access their
VMs. In this case even the provider will not be able to
illegally access the resources on VMs. This mechanism of
sharing the security will provide confidence to the clients for
using cloud computing technology with complete trust. The
proposed model will describe the technique of sharing the
security with clients.

3.

75

keys for encryption. It is a hardware-based solution that
prevents hacking attempts to capture passwords, encryption
keys, and other sensitive data. The security features provided
by the TPM are internally supported by Hashing, Random
number generation, Asymmetric key generation and
Asymmetric encryption/decryption. Each individual TPM has
a unique signature initialized during the silicon
manufacturing process that enhances the trust effectiveness.
Every TPM must have an owner before it can be utilized.
The TPM user must be physically present to take ownership.
Once this procedure is completed and the TPM has a unique
owner, the TPM is activated [4].
Beside TPM most commonly used security module is
TCM. It defines a subsystem including memory protection
and execution protection function which builds trust root for
a computing system. TCM is the trust root for storage,
achieves key management functions, provides the appropriate
cryptography service and protects the private information of
owner and user such as authentication key or sensitive data
effectively against unauthorized access [5].
The proposed TP is the combination of two powerful
modules Virtual Trusted Platform Module (VTPM) and
Virtual Trusted Cryptography Module (VTCM) as shown in
figure-1. VTPM is virtualized from TPM and VTCM is
virtualized from TCM. The proposed model considers that
TPM and TCM are being used by the cloud provider at the
physical layer to secure the overall cloud architecture.

A Trusted Virtual Private Space Model for
Cloud Computing

As discussed in previous section that the main challenge
faced in cloud computing technology is regarding to the trust
on the provider. In order to enhance the trust level in cloud
computing, the author suggests a trusted cloud model that is
consists of a new technique called as Virtual Private Space
(VPS). It is a virtual area that contains a VM for each client.
A VM is consists of a virtual operating system that is running
client’s applications and maintaining a virtual storage. Forexample if the client is a banking organization, VM will run
the applications such as online banking system. These
applications will be accessed by bank customers as shown in
figure-1. VPS is fully secured by Trust Protocol (TP). It is a
new technique introduced in this research paper. In order to
understand the concept of TP first we have to clarify the
concept of Trusted Platform Module (TPM) and Trusted
Cryptography Module (TCM).
TPM is a security device that holds computer-generated

Figure 1. Trusted VPS cloud computing Model.

The security of physical layer is under the responsibility
of provider but security of VMs is only under the responsibly
of clients so security is kind of a shared agreement between
the clients and provider. The proposed model shows that the
administrator of client will manage the security of VMs by
using TP. With the usage of TP, the VM of client is secured
by two shields TPM and TCM. By using TP clients will be
able to manage their cloud security according to their own
requirements and standards, they will not be anxious that
their information will be leaked out by the provider, because
Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 74-76, September 2011

client is the only one who is aware about his security
encryption keys. For-example if client is a Banking
organization, then the bank’s system administrator will
manage the security of VPS. The advantage of using TP is
that clients can generate two security encryption certificates
one by VTPM and second by VTCM. It is kind of double
protection security wall. If security of one component is
break out, the second component will act as backbone for
securing the VM. When security is managed by clients
according to their own requirements, it will provide them a
sense of trust to adopt the technology of cloud computing
without being anxious about the loss of their critical and
sensitive data.

4.

Conclusion

The proposed concept of providing the trust in the cloud
computing architecture is based upon the conceptual
techniques of VPS and TP. The model is not implemented
yet, but it is considered as future direction of this research.
The future aim of this research is to implement the proposed
model by giving access to Banking and Health organizations
as clients. The features and comprehensive working
mechanism of TP will be discussed in future research
publications.

Acknowledgment
The credit of accomplishing this research paper goes to
several people. First, I would like to thank my parents. They
always encouraged me to move further to face every
challenge in my life. Secondly, I am thankful to Dr.
Jamalullail Ab Manan for his ideas and opinion towards this
research. Finally, I am thankful to my supervisor and friends
for encouraging me to write this research paper.

References
[1]

[2]

[3]

[4]

[5]

Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen, and Zhenghu
Gong, “The Characteristics of Cloud Computing,” Parallel Processing
Workshops (ICPPW), 2010 39th International Conference on, 2010,
pp. 275-279.
Liang Zhong, Tianyu Wo, Jianxin Li, and Bo Li, “A VirtualizationBased SaaS Enabling Architecture for Cloud Computing,” Autonomic
and Autonomous Systems (ICAS), 2010 Sixth International Conference
on, 2010, pp. 144-149.
F. John Krautheim, Dhananjay S. Phatak, and Alan T. Sherman:
“Introducing the Trusted Virtual Environment Module”: A New
Mechanism for Rooting Trust in Cloud Computing, TRUST 2010, p.
211-227.
Xing Zhang, Ming Zhou, Jun-Xi Zhuang, and Jian Li, “Implementation
of ECC-Based Trusted Platform Module,” Machine Learning and
Cybernetics, 2007 International Conference on, 2007, pp. 2168-2173.
Jian Wang, Yanheng Liu, Wenbin Gao, "Securing Internet of Vehicles
Using TCM", JDCTA: International Journal of Digital Content
Technology and its Applications, 2010, Vol. 4, No. 7, pp. 226 - 233.

76

Weitere ähnliche Inhalte

Was ist angesagt?

Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud securityAsmaa Ibrahim
 
Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computingMd. Hasibur Rashid
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challengesbornresearcher
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSIJNSA Journal
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...Manimaran A
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganographyiosrjce
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudHassan EL ALLOUSSI
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)ClubHack
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET Journal
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationVenkateswar Reddy Melachervu
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET Journal
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 

Was ist angesagt? (16)

Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2Zimory White Paper: Security in the Cloud pt 2/2
Zimory White Paper: Security in the Cloud pt 2/2
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Cloud implementation security challenges
Cloud implementation security challengesCloud implementation security challenges
Cloud implementation security challenges
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDSSECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
 
A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...A study on securing cloud environment from d do s attack to preserve data ava...
A study on securing cloud environment from d do s attack to preserve data ava...
 
Fog doc
Fog doc Fog doc
Fog doc
 
Secure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and SteganographySecure Data Storage in Cloud Using Encryption and Steganography
Secure Data Storage in Cloud Using Encryption and Steganography
 
Presentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloudPresentation Pci-dss compliance on the cloud
Presentation Pci-dss compliance on the cloud
 
Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)Cloud computing security & forensics (manu)
Cloud computing security & forensics (manu)
 
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud ComputingIRJET - Study Paper on Various Security Mechanism of Cloud Computing
IRJET - Study Paper on Various Security Mechanism of Cloud Computing
 
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter PresentationCloud Computing and Security - ISACA Hyderabad Chapter Presentation
Cloud Computing and Security - ISACA Hyderabad Chapter Presentation
 
IRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security MechanismIRJET- Security Concern: Analysis of Cloud Security Mechanism
IRJET- Security Concern: Analysis of Cloud Security Mechanism
 
Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 

Andere mochten auch

Andere mochten auch (16)

SAN and NAS Concepts - Eric Vanderburg - JurInnov
SAN and NAS Concepts - Eric Vanderburg - JurInnovSAN and NAS Concepts - Eric Vanderburg - JurInnov
SAN and NAS Concepts - Eric Vanderburg - JurInnov
 
Challenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computingChallenges and benefits for adopting the paradigm of cloud computing
Challenges and benefits for adopting the paradigm of cloud computing
 
Taller 6 de icc
Taller 6 de iccTaller 6 de icc
Taller 6 de icc
 
Pembahasan
PembahasanPembahasan
Pembahasan
 
August october js library newsletter 2013
August  october js library newsletter 2013August  october js library newsletter 2013
August october js library newsletter 2013
 
Taller 5 de icc
Taller 5 de iccTaller 5 de icc
Taller 5 de icc
 
Presentación1
Presentación1Presentación1
Presentación1
 
Watch crusaders vs chiefs live telecast
Watch crusaders vs chiefs live telecastWatch crusaders vs chiefs live telecast
Watch crusaders vs chiefs live telecast
 
Watch crusaders vs chiefs live super rugby
Watch crusaders vs chiefs live super rugbyWatch crusaders vs chiefs live super rugby
Watch crusaders vs chiefs live super rugby
 
Pccoe placements
Pccoe placementsPccoe placements
Pccoe placements
 
Kata Pengantar
Kata PengantarKata Pengantar
Kata Pengantar
 
Cover
CoverCover
Cover
 
Watch crusaders vs chiefs tv coverage
Watch crusaders vs chiefs tv coverageWatch crusaders vs chiefs tv coverage
Watch crusaders vs chiefs tv coverage
 
El decalogo
El decalogoEl decalogo
El decalogo
 
351 216.
351 216.351 216.
351 216.
 
Digital media designd
Digital media designdDigital media designd
Digital media designd
 

Ähnlich wie Cloud computing

A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providersiosrjce
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentIOSR Journals
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsEditor IJCATR
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docxcherry686017
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issuesJahangeer Qadiree
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud ComputingMervat Bamiah
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar reportshafzonly
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 

Ähnlich wie Cloud computing (20)

I017225966
I017225966I017225966
I017225966
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
Encryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing EnvironmentEncryption Technique for a Trusted Cloud Computing Environment
Encryption Technique for a Trusted Cloud Computing Environment
 
H017155360
H017155360H017155360
H017155360
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
The Management of Security in Cloud Computing Ramgovind.docx
The Management of Security in Cloud Computing  Ramgovind.docxThe Management of Security in Cloud Computing  Ramgovind.docx
The Management of Security in Cloud Computing Ramgovind.docx
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Solutions of cloud computing security issues
Solutions of cloud computing security issuesSolutions of cloud computing security issues
Solutions of cloud computing security issues
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
Challenges  and  Benefits-for Adopting  the Paradigm of Cloud ComputingChallenges  and  Benefits-for Adopting  the Paradigm of Cloud Computing
Challenges and Benefits-for Adopting the Paradigm of Cloud Computing
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Cloud computing seminar report
Cloud computing seminar reportCloud computing seminar report
Cloud computing seminar report
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 
Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?Can You Trust Cloud Security In Public Cloud?
Can You Trust Cloud Security In Public Cloud?
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 

Kürzlich hochgeladen

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Cloud computing

  • 1. International Journal of Research and Reviews in Information Sciences (IJRRIS) Vol. 1, No. 3, September 2011, ISSN: 2046-6439 © Science Academy Publisher, United Kingdom www.sciacademypublisher.com 74 A Trusted Virtual Private Space Model for Enhancing the Level of Trust in Cloud Computing Technology Sarfraz Nawaz Brohi Universiti Teknologi Malaysia, Kuala Lumpur, Malaysia Email: sarfraz_brohi@hotmail.com Abstract – Gartner Inc, one of the world’s leading technology research companies highlighted the list of top ten technologies and trends that will be strategic for most IT organizations in 2010. Cloud computing rules the list of technologies with its placement at number one position. Cloud computing is not only about a software that is accessed remotely but it is an innovative paradigm of utilizing the IT resources efficiently and effectively. Cloud computing removes the burden of managing the technology from the client’s side. Clients are just concerned with the utilization of IT resources without being concerned about management processes. With the usage of cloud computing the storage of clients is maintained at the data center under the security of cloud provider. Nowadays a common question arises is how to trust the provider. Trust is one of the emerging issues that have created barriers between technology of cloud computing and its clients/users. In an objective to enhance the trust in cloud computing technology, this research paper introduces a technique of virtual private space model that is consists of a trust protocol. Keywords – Trust Protocol, Virtual Private Space Model, Security 1. Introduction Cloud computing is an emerging technology due to its cost effective benefits. With the exploit of this technology clients are proficient to access several computing resources such as applications, computing platforms and datacenters as on-demand services. Cloud providers are facilitating the clients mainly with three types of services, Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS). SaaS refers to the running applications that are provided to the clients as a service. These applications can be accessed through a thin layer interface such as a web-browser. Due to the use of SaaS clients don’t need to install and buy licensed applications, they just need to follow the pay-per-use pattern. However SaaS is not fully reliable when it comes to the use of realtime applications such as 3D games. These applications require buffering time, so their performance becomes slower when users access through internet. PaaS is the delivery of a computing platform over the web as a service. PaaS enables the clients to create web applications rapidly without the cost and complexity of buying and managing the underlying software/hardware. IaaS is the delivery of huge computing resources such as the capacity of processing, storage and network. It enables the clients to use virtual software, hardware, datacenter and networking components as on-demand services. The clients are not required to purchase disks or other storage devices [1]. It seems to be that cloud computing is on its approach to remove the need of hardware devices and licensed applications. In the near future clients will be able to use software such as word processing applications, operating systems without the need of heavy hardware devices, as the client system doesn’t need to process these applications [2]. Beside the numerous advantages of cloud computing it should be also considered that sometimes cloud can be rainy as well. In other words security on cloud is not trustworthy. When data of a client is on the datacenter of third party cloud provider, there are obvious chances of security, hack, theft and malicious activities that can be performed by illegal users such as hackers. In order to contribute in the research field of cloud computing, this research paper discusses a trusted cloud model that will provide the security for virtual machine (VM) of each client on cloud without affecting the performance of required service. 2. Trust: A Challenge in Cloud Computing In the cloud computing architecture, the communication link is between the clients and a provider, where clients are engaged in the usage of resources without being concerned about maintenance and security issues. In the traditional architecture of cloud computing the main issue faced was that if any malicious activity affected the storage of one client. It will also affect the storage of other clients that are relying on same hardware and operating platform [3]. Somehow, this issue is now solved by adopting the technique of virtualization where data of each client is stored on an isolated VM, so if any malicious activity detected in the VM of one client, it will not influence the VM of other clients. The virtualization technique brought up few advantages such as isolating the operating platforms and reducing the amount of required hardware devices, however it incurs the issues of security. Using the virtualization concept in cloud computing, cloud providers are able to store the data of clients on isolated VMs but data is stored on the cloud with the provider so clients do not feel sense of control on their personal data. Normally the clients such as Banking or Healthcare sectors
  • 2. Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 74-76, September 2011 where confidentiality of information is a vital task, these clients are not ready to adopt the paradigm of cloud computing due to the risk of trust. In virtualization, there is challenge regarding to the trust on the provider because the task of maintaining the security of VM is fully under the responsibility of cloud provider so clients don’t fully trust on the provider. They believe provider may leak out their customers personal records [3]. In order to deeply clarify the trust issue in the cloud computing, consider an example of an owner of shopping mall and tenants. For-example a shopping mall is given to the tenants on rental, where they are required to pay according to the usage of resources such as rental for the shop, but security and maintenance will be provided by the owner. Tenants are not responsible about security and maintenance so it saves cost and time for them. On the other hand, security keys are only with the owner. When tenants are saving all their personal resources inside the shopping mall of a third party owner, the issue is that how to trust that their resources will be safe without any security threats. Now apply the same scenario on cloud computing, suppose the owner of the mall is the cloud provider such as Google, Amazon or Microsoft and tenants are the cloud clients such as HealthCare and Banking organizations. The clients will use the datacenters of cloud provider and if security is under the management of cloud provider, clients are not confident enough to trust the provider because their information is very critical, so it is a challenging task to provide trust to the clients where information is very critical. If security is shared between the clients and a provider, forexample provider manages the security of overall datacenter to ensure that no one can threat the security of client’s VMs and other part of security is managed by the clients such as clients are acquiring secret encryption locks to access their VMs. In this case even the provider will not be able to illegally access the resources on VMs. This mechanism of sharing the security will provide confidence to the clients for using cloud computing technology with complete trust. The proposed model will describe the technique of sharing the security with clients. 3. 75 keys for encryption. It is a hardware-based solution that prevents hacking attempts to capture passwords, encryption keys, and other sensitive data. The security features provided by the TPM are internally supported by Hashing, Random number generation, Asymmetric key generation and Asymmetric encryption/decryption. Each individual TPM has a unique signature initialized during the silicon manufacturing process that enhances the trust effectiveness. Every TPM must have an owner before it can be utilized. The TPM user must be physically present to take ownership. Once this procedure is completed and the TPM has a unique owner, the TPM is activated [4]. Beside TPM most commonly used security module is TCM. It defines a subsystem including memory protection and execution protection function which builds trust root for a computing system. TCM is the trust root for storage, achieves key management functions, provides the appropriate cryptography service and protects the private information of owner and user such as authentication key or sensitive data effectively against unauthorized access [5]. The proposed TP is the combination of two powerful modules Virtual Trusted Platform Module (VTPM) and Virtual Trusted Cryptography Module (VTCM) as shown in figure-1. VTPM is virtualized from TPM and VTCM is virtualized from TCM. The proposed model considers that TPM and TCM are being used by the cloud provider at the physical layer to secure the overall cloud architecture. A Trusted Virtual Private Space Model for Cloud Computing As discussed in previous section that the main challenge faced in cloud computing technology is regarding to the trust on the provider. In order to enhance the trust level in cloud computing, the author suggests a trusted cloud model that is consists of a new technique called as Virtual Private Space (VPS). It is a virtual area that contains a VM for each client. A VM is consists of a virtual operating system that is running client’s applications and maintaining a virtual storage. Forexample if the client is a banking organization, VM will run the applications such as online banking system. These applications will be accessed by bank customers as shown in figure-1. VPS is fully secured by Trust Protocol (TP). It is a new technique introduced in this research paper. In order to understand the concept of TP first we have to clarify the concept of Trusted Platform Module (TPM) and Trusted Cryptography Module (TCM). TPM is a security device that holds computer-generated Figure 1. Trusted VPS cloud computing Model. The security of physical layer is under the responsibility of provider but security of VMs is only under the responsibly of clients so security is kind of a shared agreement between the clients and provider. The proposed model shows that the administrator of client will manage the security of VMs by using TP. With the usage of TP, the VM of client is secured by two shields TPM and TCM. By using TP clients will be able to manage their cloud security according to their own requirements and standards, they will not be anxious that their information will be leaked out by the provider, because
  • 3. Sarfraz Nawaz Brohi / IJRRIS, Vol. 1, No. 3, pp. 74-76, September 2011 client is the only one who is aware about his security encryption keys. For-example if client is a Banking organization, then the bank’s system administrator will manage the security of VPS. The advantage of using TP is that clients can generate two security encryption certificates one by VTPM and second by VTCM. It is kind of double protection security wall. If security of one component is break out, the second component will act as backbone for securing the VM. When security is managed by clients according to their own requirements, it will provide them a sense of trust to adopt the technology of cloud computing without being anxious about the loss of their critical and sensitive data. 4. Conclusion The proposed concept of providing the trust in the cloud computing architecture is based upon the conceptual techniques of VPS and TP. The model is not implemented yet, but it is considered as future direction of this research. The future aim of this research is to implement the proposed model by giving access to Banking and Health organizations as clients. The features and comprehensive working mechanism of TP will be discussed in future research publications. Acknowledgment The credit of accomplishing this research paper goes to several people. First, I would like to thank my parents. They always encouraged me to move further to face every challenge in my life. Secondly, I am thankful to Dr. Jamalullail Ab Manan for his ideas and opinion towards this research. Finally, I am thankful to my supervisor and friends for encouraging me to write this research paper. References [1] [2] [3] [4] [5] Chunye Gong, Jie Liu, Qiang Zhang, Haitao Chen, and Zhenghu Gong, “The Characteristics of Cloud Computing,” Parallel Processing Workshops (ICPPW), 2010 39th International Conference on, 2010, pp. 275-279. Liang Zhong, Tianyu Wo, Jianxin Li, and Bo Li, “A VirtualizationBased SaaS Enabling Architecture for Cloud Computing,” Autonomic and Autonomous Systems (ICAS), 2010 Sixth International Conference on, 2010, pp. 144-149. F. John Krautheim, Dhananjay S. Phatak, and Alan T. Sherman: “Introducing the Trusted Virtual Environment Module”: A New Mechanism for Rooting Trust in Cloud Computing, TRUST 2010, p. 211-227. Xing Zhang, Ming Zhou, Jun-Xi Zhuang, and Jian Li, “Implementation of ECC-Based Trusted Platform Module,” Machine Learning and Cybernetics, 2007 International Conference on, 2007, pp. 2168-2173. Jian Wang, Yanheng Liu, Wenbin Gao, "Securing Internet of Vehicles Using TCM", JDCTA: International Journal of Digital Content Technology and its Applications, 2010, Vol. 4, No. 7, pp. 226 - 233. 76