ABSTRACT

This chapter describes the common technologies for designing a secured system and introduces how they are applied in a cloud environment. A user's role can be established by looking up a profile table by the given user ID. Or, the role can be passed in as part of the authentication token in the form of a claim. Some databases, such as SQL Database and Oracle, support row-level security that allows system administrators to define predicates that filter database records based on user characteristics, such as tenant ID. In 2015, an anonymous hacker hacked BitDefender, an award-winning Internet security software company. The hacker got a hold of the company's user database and claimed to have access to all user records with their passwords. Trusted execution environment (TEE) uses isolated environment to provide compute privacy. This makes TEE applicable to virtually all computational problems.