The benefits of operational efficiency and flexibility delivered by public cloud resources have encouraged todays organizations to migrate applications and data to external computing platforms located outside the perceived security of on-premises infrastructures. Many businesses are now adopting a cloud-first design approach that emphasizes elastic scalability and cost reduction above ownership and management, and, in some cases, security.
Analyzing global trends in public cloud services, Gartner has predicted that spending on these resources will increase from $182.4B in 2018 to $331.2B in 2022, with 30 percent of all new software investments being cloud native by the end of 2019.
Trusting Someone Else to Guard Your Secrets
The benefits of third-party infrastructure and applications, however, come with risks. Deploying sensitive applications and data on computing platforms that are outside of an organizations owned and managed infrastructure requires trust in the service providers hardware and software used to process, and ultimately protect, that data.
Trusting a cloud provider can be disastrous for an organization financially and reputation-wise if they are the subject of a successful cyber-attack. In its Ninth Annual Cost of Cybercrime Study, Accenture reported that in 2018 the average cost of cyber-attacks involving either a malicious insider or the execution of malicious code was $3M per year, according to participants.
Confidential Computing
One response to the problem of the trustworthiness of the cloud when it comes to data protection has been the emergence of the Trusted Execution Environment (TEE), which has led to the concept of confidential computing. Industry leaders joined together to form the Confidential Computing Consortium (CCC) in October.
The Confidential Computing Consortium looks to address the security issues around data in use, enabling encrypted data to be processed in memory without exposing it to the rest of the system. This is the first industry-wide initiative by industry leaders to address data in use, since todays encryption security approaches mostly focus on data at rest or data in transit. The work of the Confidential Computing Consortium is especially important as companies move more workloads to multiple environments, including on premises, public cloud, hybrid, and edge environments.
Secure Enclaves
One of the most important technologies for addressing the problem of protecting data in use can be found in the form of secure enclaves, such as the protected memory regions established by Intel Software Guard Extensions (SGX). Secure enclaves allow applications to execute securely and be enforced at the hardware level by the CPU itself. All data is encrypted in memory and decrypted only while being used inside the CPU: the data remains completely protected, even if the operating system, hypervisor or root user is compromised. With secure enclaves, data can be fully protected across its entire lifecycle at rest, in motion and in use for the first time.
Secure enclaves can offer further security benefits using a process called attestation to verify that the CPU is genuine, and that the deployed application is the correct one and hasnt been altered.
Operating in secure enclaves with attestation gives users complete confidence that code is running as intended and that data is completely protected during processing. This approach is gaining traction, for example it enables sensitive applications, including data analytics, Machine Learning, and Artificial Intelligence, to run safely in the cloud with regulatory compliance.
Runtime Encryption
Encryption is a proven approach for effective data security, particularly when protecting data at rest and data in motion. However, as discussed above, a key requirement for confidential computing, and the focus of the Confidential Computing Consortium, is protecting data in use. When an application starts to run, its data is vulnerable to a variety of attacks, including malicious insiders, root users, credential compromise, OS zero-day, and network intruders.
Runtime encryption provides deterministic security with hardware-aided memory encryption for applications to protect data in use. Through optimization of the Trusted Computing Base (TCB), it enables encrypted data to be processed in memory without exposing it to the rest of the system.
This reduces the risks to sensitive data and provides greater control and transparency for users. Runtime encryption provides complete cryptographic protection for applications by running them securely inside a TEE and defending them even from root users and physical access to the server.
Expanding the Circle of Trust
The number one concern cited by enterprises in their move to the cloud continues to be security. Confidential computing and protecting data in use gives sensitive applications a safe place that protects them from todays infrastructure attacks.
Confidential computing is critical for protecting cloud data, and it is fundamentally helping establish and expand the circle of trust in cloud computing. It creates isolated runtime environments that allow execution of sensitive applications in a protected state, keeping cloud apps and data completely secure when in use.
With secure enclaves and runtime encryption supporting confidential computing, customers know that, no matter what happens, their data remains cryptographically protected. No amount of zero-day attacks, infrastructure compromises, and even government subpoenas can compromise the data. Confidential computing expands the deterministic security needed for the most sensitive cloud applications, at the performance level demanded by modern Internet-scale applications.
A Secure Cloud Future
As Gartner has reported, businesses are migrating their sensitive data and applications to public cloud services, a practice that saves them from ownership and maintenance of infrastructure that will inevitably be obsolete in the future.
Leading technology providers have recognized that confidential computing provides a security model ready to address the problems of untrusted hardware and software that have hampered this transition to the cloud.
With a growing number of use cases, and interest and deployments surging, confidential computing environments will be relied on to protect data in growing areas such as industry 4.0, digital health, the Internet of Things (IoT), and federated machine learning systems.
As the Confidential Computing Consortium continues its work, individuals and businesses may at some point expect a confidential computing architecture as a prerequisite for the exchange and processing of our private data.
Read more:
Extending the Circle of Trust with Confidential Computing - Infosecurity Magazine
- Roundup Of Cloud Computing Forecasts, 2017 - Forbes - May 3rd, 2017 [May 3rd, 2017]
- RCom arm in tie-up for cloud computing - Moneycontrol.com - May 3rd, 2017 [May 3rd, 2017]
- How Do You Define Cloud Computing? - Data Center Knowledge - May 3rd, 2017 [May 3rd, 2017]
- 5 Cloud Computing Stocks to Buy - TheStreet.com - May 3rd, 2017 [May 3rd, 2017]
- Cloud Computing Continues to Influence HPC - insideHPC - May 3rd, 2017 [May 3rd, 2017]
- Red Hat's New Products Centered Around Cloud Computing, Containers - Virtualization Review - May 3rd, 2017 [May 3rd, 2017]
- Adobe bets big on cloud computing for marketing, creative professionals - Livemint - May 3rd, 2017 [May 3rd, 2017]
- Verizon sells cloud services to IBM in 'unique cooperation between ... - Cloud Tech - May 3rd, 2017 [May 3rd, 2017]
- How Cloud Computing Is Turning the Tide on Heart Attacks - Fortune - May 3rd, 2017 [May 3rd, 2017]
- Hospital CIOs see benefits of healthcare cloud computing - TechTarget - May 3rd, 2017 [May 3rd, 2017]
- Trends In Cloud Computing - Business Solutions Magazine - June 6th, 2017 [June 6th, 2017]
- A deeper dive into cloud security as a service: Advantages and issues - Cloud Tech - June 6th, 2017 [June 6th, 2017]
- OpenText buys cloud computing firm for US$103 million - TheRecord.com - June 6th, 2017 [June 6th, 2017]
- Belfast IT firm celebrates cloud computing success in 57 countries ... - Belfast Telegraph - June 6th, 2017 [June 6th, 2017]
- Meet The Cloud Wars Top 10: The World's Most-Powerful Cloud-Computing Vendors - Forbes - June 6th, 2017 [June 6th, 2017]
- How to approach cloud computing and cyber security in 2017 - Information Age - June 6th, 2017 [June 6th, 2017]
- CFOs have discovered the big stick of cloud computing - InfoWorld - June 6th, 2017 [June 6th, 2017]
- Belmont Stakes Odds 2017: Latest Vegas Betting Lines Before Post Positions Draw - Bleacher Report - June 7th, 2017 [June 7th, 2017]
- Cloudistics Announces New Cloud Computing Program That Enables High Margin Reoccurring Revenue Models for ... - Marketwired (press release) - June 7th, 2017 [June 7th, 2017]
- CloudCheckr, cloud computing company expects rapid growth in Rochester - WXXI News - June 7th, 2017 [June 7th, 2017]
- IBM Losing Facebook's WhatsApp as Cloud Customer, says CNBC - Barron's - June 7th, 2017 [June 7th, 2017]
- What My Father Taught Me About Cloud Computing - Virtualization Review - June 7th, 2017 [June 7th, 2017]
- Workday Phenomenon Goes Global As Cloud Computing Goes Mainstream - Forbes - June 7th, 2017 [June 7th, 2017]
- New Cloud Computing and IT Outsourcing Requirements in the Financial Sector - JD Supra (press release) - June 9th, 2017 [June 9th, 2017]
- 3 Things You Should Know About Cloud Computing Right Now - Fortune - June 9th, 2017 [June 9th, 2017]
- Learning in the Sky: Collaborative Robots Embrace Cloud Computing - Machine Design - June 9th, 2017 [June 9th, 2017]
- Best Practices To Manage Your Hybrid Cloud - Forbes - June 9th, 2017 [June 9th, 2017]
- Here's how venture capitalists are thinking about cloud computing companies and technologies - GeekWire - June 9th, 2017 [June 9th, 2017]
- Amazon is helping veterans find jobs in cloud computing - Marketplace - Marketplace.org - June 9th, 2017 [June 9th, 2017]
- New Cloud Computing and IT Outsourcing Requirements in the Financial Sector - Lexology (registration) - June 9th, 2017 [June 9th, 2017]
- Growing Patent Claim Risks in Cloud Computing - Lexology (registration) - June 9th, 2017 [June 9th, 2017]
- The benefits of cloud computing, Rust 1.18, and intelligent tracking prevention in WebKit SD Times news digest ... - SDTimes.com - June 9th, 2017 [June 9th, 2017]
- Edge Computing Is New Cloud Computing Tech Investors Should Track - GuruFocus.com - June 9th, 2017 [June 9th, 2017]
- Real Estate Weekly: Digital Realty Becomes A Cloud Computing Giant - Seeking Alpha - June 9th, 2017 [June 9th, 2017]
- Virtualization admin? Pivot -- pivot now -- to a cloud computing career - TechTarget - June 10th, 2017 [June 10th, 2017]
- Why isn't Cloud Computing in the 2017 Belmont Stakes? - FanSided - June 11th, 2017 [June 11th, 2017]
- Cloud Computing Companies Move Into Medical Diagnosis (GOOG, IBM) - Investopedia - June 11th, 2017 [June 11th, 2017]
- China's cloud industry moving to new era with emergence of unicorns - TechNode (blog) - June 12th, 2017 [June 12th, 2017]
- Terry Crews Is On Crackdown 3 Trailer, No Cloud Computing For Single Player - EconoTimes - June 12th, 2017 [June 12th, 2017]
- The Risks and Perquisites of Cloud Computing - DATAQUEST - June 12th, 2017 [June 12th, 2017]
- Alibaba Cloud announces launch of data centres in India and Indonesia - Cloud Tech - June 12th, 2017 [June 12th, 2017]
- Indonesia banks have yet to implement cloud computing - Jakarta Post - June 13th, 2017 [June 13th, 2017]
- 'Sweden is heaven for cloud computing': Amazon Nordic chief - The ... - The Local Sweden - June 14th, 2017 [June 14th, 2017]
- Amazon.com to open second government cloud-computing region ... - The Seattle Times - June 14th, 2017 [June 14th, 2017]
- Shadow raises $57 million for its cloud computing service for ... - TechCrunch - June 14th, 2017 [June 14th, 2017]
- Amazon Still Leads Cloud Rankings, But Competition Is Coming On Strong - Fortune - June 16th, 2017 [June 16th, 2017]
- Alibaba to enter European cloud computing market in mid-2017 | Air ... - Air Cargo World (registration) - June 17th, 2017 [June 17th, 2017]
- Alibaba to enter European cloud computing market in mid-2017 - Air Cargo World (registration) - June 17th, 2017 [June 17th, 2017]
- Pressing Tech Issue: Enterprise Software Vs. Cloud Computing? - Credit Union Times - June 17th, 2017 [June 17th, 2017]
- 7 Tips for Securely Moving Data to the Cloud - Government Technology (blog) - June 20th, 2017 [June 20th, 2017]
- Chinese tech giant Alibaba joins key open-source cloud computing foundation - GeekWire - June 20th, 2017 [June 20th, 2017]
- Microsoft Could Surpass Amazon in Cloud Computing This Year (AMZN, MSFT) - Investopedia - June 20th, 2017 [June 20th, 2017]
- GDS Holdings Limited (GDS) Announces Strategic Partnership with Tencent Cloud - StreetInsider.com - June 20th, 2017 [June 20th, 2017]
- Cloud first - Philippine Star - June 20th, 2017 [June 20th, 2017]
- Three Considerations for Reducing Risk in Cloud Computing - CIOReview - June 21st, 2017 [June 21st, 2017]
- Cloud Computing and Digital Divide 2.0 - CircleID - CircleID - June 21st, 2017 [June 21st, 2017]
- Microsoft will ride artificial intelligence, cloud computing to higher ... - CNBC - June 21st, 2017 [June 21st, 2017]
- Cloud-Computing Business Lifts Oracle's Profit -- Update - Fox Business - June 21st, 2017 [June 21st, 2017]
- Report affirms continued cloud spend for US businesses in 2017 - Cloud Tech - June 22nd, 2017 [June 22nd, 2017]
- Catching up with an interconnected federal cloud - GCN.com - June 22nd, 2017 [June 22nd, 2017]
- Cloud-Computing Business Lifts Oracle's Profit -- 2nd Update - Fox Business - June 22nd, 2017 [June 22nd, 2017]
- Cisco adapts to the rise of cloud computing - The Economist - June 22nd, 2017 [June 22nd, 2017]
- Amazon accuses Walmart of bullying in cloud computing clash - BBC News - June 22nd, 2017 [June 22nd, 2017]
- Companies plan to spend more on cloud computing services this year, higher prices among drivers: Clutch - Canadian Underwriter - June 23rd, 2017 [June 23rd, 2017]
- Survey: businesses ramp up spending on cloud computing DC ... - DC Velocity - June 24th, 2017 [June 24th, 2017]
- Morgan Stanley: Cloud computing is at 'an inflection point' but how big will it get? - GeekWire - June 26th, 2017 [June 26th, 2017]
- How the cloud has changed education and training - TNW - June 26th, 2017 [June 26th, 2017]
- Cloud computing key to 4th industrial revolution - News VietNamNet - VietNamNet Bridge - June 26th, 2017 [June 26th, 2017]
- Lady Eli, Cloud Computing Among Workers for Brown - BloodHorse.com (press release) (registration) (blog) - June 26th, 2017 [June 26th, 2017]
- Microsoft signs cloud-computing partnership with Box - The Seattle Times - June 27th, 2017 [June 27th, 2017]
- Microsoft Signs Cloud Computing Partnership with Box - CIO Today - June 30th, 2017 [June 30th, 2017]
- US action on Microsoft email case could devastate cloud computing - Irish Times - June 30th, 2017 [June 30th, 2017]
- Cloud computing challenges today: Planning, process and people - TechTarget - July 2nd, 2017 [July 2nd, 2017]
- Five podcasts to catch up on the latest trends in cloud computing - TechTarget - July 2nd, 2017 [July 2nd, 2017]
- Microsoft reportedly set to lay off thousands as part of massive sales reorganization - GeekWire - July 3rd, 2017 [July 3rd, 2017]
- VMware to surge more than 20 percent because the Amazon cloud ... - CNBC - August 25th, 2017 [August 25th, 2017]
- Google Unveils Custom Hardware Chip for Cloud - Investopedia - August 25th, 2017 [August 25th, 2017]
- Cloud Computing Confirmed for Travers | TDN | Thoroughbred Daily ... - Thoroughbred Daily News - August 25th, 2017 [August 25th, 2017]
- Why 2017 Is The Year To Understand Cloud Computing - Nasdaq - August 25th, 2017 [August 25th, 2017]
- Biz Cloud Computing - Four States Homepage - August 25th, 2017 [August 25th, 2017]