Abstract
Trusted execution technology has a long history of attempts/partial successes aimed at securing the execution of code and controlling access to premium/pay-peruse content. Cloud advantages over in-house services include cost eciency and tailored costs, where customers only payper-use of resources and services (see Figure 25.1) [1]. Cloud computing elastic resource provisioning is an attractive model for service providers on many layers (application, hosting platform, and domain-speci c services to cite a few). e cloud communication environment is Internet-based, where shared resources, soware, and data are provided on-demand, with the user having little or no e ective control over the level of trust of the adopted resources. Cloud computing is mainly based on sharing resources among separately distributed servers and individual clients. Such sharing is performed by controlling/mediating client access to the stored les and data. Despite these technical and economical bene ts, many potential cloud consumers are still hesitant to adopt cloud computing due to security and privacy concerns. By using cloud services, the user gives up some control over the IT operation. In particular, nonfunctional aspects of service provisioning do a ect the trustworthiness of the service.
Original language | English (US) |
---|---|
Title of host publication | Cloud Computing Security |
Subtitle of host publication | Foundations and Challenges |
Publisher | CRC Press |
Pages | 331-344 |
Number of pages | 14 |
ISBN (Electronic) | 9781482260953 |
ISBN (Print) | 9781482260946 |
DOIs | |
State | Published - Jan 1 2016 |
Bibliographical note
Publisher Copyright:© 2017 by Taylor and Francis Group, LLC.
ASJC Scopus subject areas
- General Computer Science