Computing Technology for Trusted Cloud Security

Roberto Di Pietro, Flavio Lombardi, Matteo Signorini

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Scopus citations

Abstract

Trusted execution technology has a long history of attempts/partial successes aimed at securing the execution of code and controlling access to premium/pay-peruse content. Cloud advantages over in-house services include cost eciency and tailored costs, where customers only payper-use of resources and services (see Figure 25.1) [1]. Cloud computing elastic resource provisioning is an attractive model for service providers on many layers (application, hosting platform, and domain-speci c services to cite a few). e cloud communication environment is Internet-based, where shared resources, soware, and data are provided on-demand, with the user having little or no e ective control over the level of trust of the adopted resources. Cloud computing is mainly based on sharing resources among separately distributed servers and individual clients. Such sharing is performed by controlling/mediating client access to the stored les and data. Despite these technical and economical bene ts, many potential cloud consumers are still hesitant to adopt cloud computing due to security and privacy concerns. By using cloud services, the user gives up some control over the IT operation. In particular, nonfunctional aspects of service provisioning do a ect the trustworthiness of the service.

Original languageEnglish (US)
Title of host publicationCloud Computing Security
Subtitle of host publicationFoundations and Challenges
PublisherCRC Press
Pages331-344
Number of pages14
ISBN (Electronic)9781482260953
ISBN (Print)9781482260946
DOIs
StatePublished - Jan 1 2016

Bibliographical note

Publisher Copyright:
© 2017 by Taylor and Francis Group, LLC.

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Computing Technology for Trusted Cloud Security'. Together they form a unique fingerprint.

Cite this