ABSTRACT

Trusted  execution  technology has a long history of attempts/partial successes aimed at securing the execution of code and controlling access to premium/pay-peruse content.

Cloud advantages over in-house services include cost eciency and tailored costs, where customers only payper-use of resources and services (see Figure 25.1)  [1]. Cloud computing elastic resource provisioning is an attractive model for service providers on many layers (application, hosting platform, and domain-speci c services to cite a few). e cloud communication environment is Internet-based, where shared resources, soware, and data are provided on-demand, with the user having little or no e ective control over the level of trust of the adopted resources. Cloud computing is mainly based on sharing resources among separately distributed servers and individual clients. Such sharing is performed by controlling/mediating client access to the stored les and data. Despite these technical and economical bene ts, many potential cloud consumers are still hesitant to adopt cloud computing due to security and privacy concerns. By using cloud services, the user gives up some control over the IT operation. In particular, nonfunctional aspects of service provisioning do a ect the trustworthiness of  the  service.