“This whitepaper outlines a new adaptation area for Trusted Execution Environments (TEE); isolated environments in which security-critical functions and services can be executed in a protected manner.”
From the cloud service perspective, current hardware-based mechanisms for protecting the end customer or service provider data in the cloud are expensive and also do not exhibit the same elasticity of resource allocation as the “non-secure” part of the computation. Providing a TEE as an end-customer security solution within the cloud can be a cost efficient and a flexible addition to existing hardware trust roots that are available in cloud settings.
Since contemporary cloud computing environments are significantly different from a terminal device in terms of hardware and software architecture, the setup (and use) of a TEE in this new context will be different from what it is today.