Cloud security       

links

Elli Androulaki photo photoChristian Cachin photo Alessandro Sorniotti photoBjoern Tackmann photo

Cloud security - overview


“Cryptography is only as good as the keys used.”

—Elli Androulaki, IBM scientist

Cloud computing aims at flexible and scalable infrastructures using virtualized resources. Although virtualization and outsourcing improve efficiency and flexibility, they also introduce new threats.

We mitigate these threats by means of new security technologies to protect virtual environments. Moreover, we are designing novel mechanisms that provide protection levels beyond those of today’s non-virtualized systems.