This whitepaper outlines a new adaptation area for Trusted Execution Environments (TEE); isolated environments in which security-critical functions and services can be executed in a protected manner. The well-established business case of TEEs is for personal mobile devices, where services like device key management, operator lock or content protection often run under the protection of a TEE.
From the cloud service perspective, current hardware-based mechanisms for protecting the end customer or service provider data in the cloud are expensive and also do not exhibit the same elasticity of resource allocation as the “non-secure” part of the computation. Providing a TEE as an end-customer security solution within the cloud can be a cost efficient and a flexible addition to existing hardware trust roots that are available in cloud settings.
Since contemporary cloud computing environments are significantly different from a terminal device in terms of hardware and software architecture, the setup (and use) of a TEE in this new context will be different from what it is today.
Viaccess-Orca is trusted by: