TY - GEN
T1 - TRESCCA - Trustworthy embedded systems for secure cloud computing
AU - Schomaker, Gunnar
AU - Herrholz, Andreas
AU - Duc, Guillaume
AU - Pacalet, Renaud
AU - Raho, Salvatore
AU - Grammatikakis, Miltos
AU - Coppola, Marcello
AU - Vega, Ignacio Garcia
PY - 2013/1/1
Y1 - 2013/1/1
N2 - Cloud Computing is an inevitable trend. In the near future almost every consumer electronic device will be connected to an ecosystem of third-party service partners, providing applications like payment systems, streamed content, etc using or producing sensitive data. The challenge is, that current cloud operators and their end users do not always trust each other. This lack of trust limits the potential of the cloud computing market. The TRESCCA project aims to lay the foundations of a secure and trustable cloud platform, by ensuring strong logical and physical security on the client devices, using both hardware security and virtualization techniques, while considering the whole cloud service architecture. The project will propose and demonstrate hardware/software solutions allowing stakeholders to delegate the processing of their sensitive data to a remote processing engine, opening up a new field of cloud services and applications. The TRESCCA approach avoids undesirable paradigm shifts, both in the software and in the hardware by complementing existing legacy solutions by non-intrusive add-ons.
AB - Cloud Computing is an inevitable trend. In the near future almost every consumer electronic device will be connected to an ecosystem of third-party service partners, providing applications like payment systems, streamed content, etc using or producing sensitive data. The challenge is, that current cloud operators and their end users do not always trust each other. This lack of trust limits the potential of the cloud computing market. The TRESCCA project aims to lay the foundations of a secure and trustable cloud platform, by ensuring strong logical and physical security on the client devices, using both hardware security and virtualization techniques, while considering the whole cloud service architecture. The project will propose and demonstrate hardware/software solutions allowing stakeholders to delegate the processing of their sensitive data to a remote processing engine, opening up a new field of cloud services and applications. The TRESCCA approach avoids undesirable paradigm shifts, both in the software and in the hardware by complementing existing legacy solutions by non-intrusive add-ons.
KW - Cloud security
KW - Embedded systems
KW - Hardware security
KW - Hardware security module
KW - Security
KW - Trescca
KW - Trustworthy ict
KW - Virtualization
U2 - 10.1109/ARES.2013.113
DO - 10.1109/ARES.2013.113
M3 - Conference contribution
AN - SCOPUS:84892424675
SN - 9780769550084
T3 - Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013
SP - 844
EP - 845
BT - Proceedings - 2013 International Conference on Availability, Reliability and Security, ARES 2013
PB - IEEE Computer Society
T2 - 2013 8th International Conference on Availability, Reliability and Security, ARES 2013
Y2 - 2 September 2013 through 6 September 2013
ER -