Cloud security     


Elli Androulaki photo photo Alessandro Sorniotti photoMarc Ph. Stoecklin photo Axel Tanner photo

Cloud security - overview

“Cryptography is only as good as the keys used.”

—Elli Androulaki, IBM scientist

Cloud computing aims at flexible and scalable infrastructures using virtualized resources. Although virtualization and outsourcing improve efficiency and flexibility, they also introduce new threats.

We mitigate these threats by means of new security technologies to protect virtual environments. Moreover, we are designing novel mechanisms that provide protection levels beyond those of today’s non-virtualized systems.