Secure Architectures in the Cloud

Sabrina De Capitani di Vimercati, Wolter Pieters, Christian W. Probst

    Research output: Book/ReportReportProfessional

    69 Downloads (Pure)


    This report documents the outcomes of Dagstuhl Seminar 11492 “Secure Architectures in the Cloud‿. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces the burden of the owners in managing their data, and may provide significant cost savings. However, cloud computing introduces new security and privacy concerns. In fact, there is little consensus on how to guarantee the confidentiality, integrity, and availability of data in cloud computing scenarios. Also, it is unclear to what extent parties can be held accountable in case something goes wrong. In this seminar, we searched for architectures, modelling approaches, and mechanisms that can help in providing guarantees for cloud security. We proposed the concept of verification-as-a-service that can guide architectures for verification of cloud architectures and configurations, as well as results of computations. We also proposed architectures for organizing customisability of security and privacy for cloud customers.
    Original languageUndefined
    Place of PublicationGermany
    Number of pages16
    ISBN (Print)2192-5283
    Publication statusPublished - 1 Dec 2011

    Publication series

    NameDagstuhl Reports
    PublisherSchloss Dagstuhl
    Volume1, issue 12
    ISSN (Print)2192-5283


    • Verification modelling
    • Verification
    • Auditing
    • Security architectures
    • Attestation
    • Cloud computing
    • Security modelling

    Cite this