<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=536468303188339&amp;ev=PageView&amp;noscript=1">

Security_WP_banner_for_LP2.jpg

Trusted Execution Environments for Cloud Infrastructure: From Server Blades to Datacenters

Resource Center

Security_WP_mockup.png

This whitepaper outlines a new adaptation area for Trusted Execution Environments (TEE); isolated environments in which security-critical functions and services can be executed in a protected manner. The well-established business case of TEEs is for personal mobile devices, where services like device key management, operator lock or content protection often run under the protection of a TEE. 

From the cloud service perspective, current hardware-based mechanisms for protecting the end customer or service provider data in the cloud are expensive and also do not exhibit the same elasticity of resource allocation as the “non-secure” part of the computation. Providing a TEE as an end-customer security solution within the cloud can be a cost efficient and a flexible addition to existing hardware trust roots that are available in cloud settings. 

Since contemporary cloud computing environments are significantly different from a terminal device in terms of hardware and software architecture, the setup (and use) of a TEE in this new context will be different from what it is today.

  

Download the complete report by filling in the form.
 
 

Viaccess-Orca is trusted by:

Orange    Telekom_Romania    Canal+    MediaSet    Singtel_1    Telecom