@incollection{, C048C2995A5380CC19394147BC4DB5DE , author={{Mr.Pramod} and {Dr. B R PrasadBabu}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}151518 } @book{b0, , author={{ SebastienBenoit Bertholon } and { PascalVarrette } and { Bouvry }} , title={{CERTICLOUD: a Novel TPM-based Approach to Ensure Cloud IaaS Security}} , year={2011} } @incollection{b1, , title={{Cloud Computing Security Threats and Responses}} , author={{ Farzadsabahi }} 10.1109/ICCSN.2011.6014715 , booktitle={{IEEE 3488 rd International Conference on Communication software and Networks(ICCSN)}} , year={May 2011} } @incollection{b2, , title={{An effective auditing scheme for cloud computing}} , author={{ RHoulihan } and { Xiaojiang Du }} , booktitle={{Global Communications Conference (GLOBECOM)}} , year={2012} } @incollection{b3, , title={{}} , journal={{IEEE}} 1604 , year={Dec. 2012} } @book{b4, , title={{}} , author={{ XinWan }} } @book{b5, , title={{}} , author={{ ZhitingXiao }} } @incollection{b6, , title={{Building Trust into Cloud Computing Using Virtualization of TPM}} , author={{ YiRen }} , booktitle={{Fourth International Conference on}} , year={2012. 2-4 Nov. 2012} 63 59 } @incollection{b7, , title={{DFCloud: A TPM-based secure data access control method of cloud storage in mobile devices}} , author={{ JaebokShin Cloud Com } and { ; Yungu Kim; Wooram Park; ChanikPark Cloud Com }} , booktitle={{2012 IEEE 4th International Conference on}} , year={Dec. 2012} 556 } @incollection{b8, , title={{The Security of Cloud Computing System enabled by Trusted Computing Technology}} , author={{ ZhidongShen } and { QiangTong }} 10.1109/ICSPS.2010.5555234 , booktitle={{2 International Conference on Signal Processing Systems}} Dalian, (ICSPS , year={July 2010} 2 , note={Print} } @incollection{b9, , title={{Getting into the SMRAM: SMM reloaded}} , author={{ Duflot }} , booktitle={{Proc. of the 10thCanSecWest conference}} of the 10thCanSecWest conference , year={2009} } @book{b10, , title={{}} , author={{ HuaWang } and { ; Yao Guo; XiaZhao }} } @incollection{b11, , title={{Keep Passwords Away from Memory: Password Caching and Verification Using TPM}} , author={{ XiangqunChen }} , booktitle={{AINA 2008. 22nd International Conference on}} , year={2008. March 2008} 762 , note={Advanced Information Networking and Applications} } @book{b12, , title={{Software developer's manual}} , author={{ ICorporation }} , year={June 2009} 3 , note={System programming guide} } @book{b13, , title={{}} , author={{ Danan;Thilakanathan } and { Chen } and { ;Shiping } and { SuryaNepal }} } @incollection{b14, , title={{Secure Multiparty Data Sharing in the Cloud Using Hardware-Based TPM Devices}} , author={{ RafaelACalvo CLOUD } and { Liu CLOUD } and { ;Dongxi CLOUD } and { JohnZic CLOUD }} , booktitle={{2014 IEEE 7th International Conference on}} , year={June 27 2014-July 2 2014} 231 224 } @incollection{b15, , title={{TREASURE: Trust Enhanced Security for Cloud Environments}} , author={{ VVaradharajan } and { UTupakula }} , booktitle={{Trust, Security and Privacy in Computing and Communications (TrustCom)}} , year={2012. June 2012} 152 , note={IEEE 11th International Conference on} } @incollection{b16, , title={{Flicker: an execution infrastructure for TCB minimization}} , author={{ JMccune } and { BParno } and { APerrig } and { MReiter } and { HIsozaki }} , booktitle={{Proc. of the ACM European Conference on Computer Systems (EuroSys)}} of the ACM European Conference on Computer Systems (EuroSys) , year={March. April 2008} } @book{b17, , title={{ARM Securtiy Technology, Building a Secure System using Trust Zone Technology}} , year={2009} } @book{b18, , title={{TPM specifications version 1.2. https:llwww.trustedcomputinggroup. org/downloads/specifications/tpm}} , year={July 2005} Trusted Computing Group } @incollection{b19, , title={{Group Signatures with Veri fier -Local Revocation}} , author={{ DanBoneh } and { HovavShacham }} , booktitle={{Proceeding of the 11th ACM conference on Computer and communications security}} eeding of the 11th ACM conference on Computer and communications securityNY , year={2004} } @book{b20, , title={{TPM}} } @book{b21, , title={{Using Data Encryption}} , author={{ S3Amazon }} } @incollection{b22, , title={{Enabling Security in Cloud Storage SLAs with Cloud Proof}} , author={{ RAPopa } and { JRLorch } and { DMolnar } and { HJWang } and { LZhuang }} , booktitle={{Proceeding of the 2011 USENIX Annual Technical Conference}} eeding of the 2011 USENIX Annual Technical Conference , year={June 2011} }