Cloud security - overview
“Cryptography is only as good as the keys used.”
—Elli Androulaki, IBM scientist
Cloud computing aims at flexible and scalable infrastructures using virtualized resources. Although virtualization and outsourcing improve efficiency and flexibility, they also introduce new threats.
We mitigate these threats by means of new security technologies to protect virtual environments. Moreover, we are designing novel mechanisms that provide protection levels beyond those of today’s non-virtualized systems.