Skip to Main Content
Virtualization and broadband Internet connections enabled existing technologies to form up under the nebulous term cloud. Cloud computing promises near infinite scalability and cost reduction by pay per use agreements. However for data outsourced to existing cloud solutions - which can be considered synonymous with unknown locations and potentially hostile environments - the security protection objectives can not be guaranteed. We present an approach that enables users to benefit from cloud computing and retain data sovereignty.