Powered by OpenAIRE graph
Found an issue? Give us feedback
ZENODOarrow_drop_down
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
versions View all 5 versions
addClaim

Trusted Cloud Enclaves and Security Governance for High-Assurance Cloud Computing

ProvenCloud Architecture
Authors: Bolignano, Dominique;

Trusted Cloud Enclaves and Security Governance for High-Assurance Cloud Computing

Abstract

Cloud computing infrastructures have become the dominant platform for modern digital systems. Governments, industries and technology companies increasingly rely on cloud environments to host critical workloads, including financial systems, industrial platforms and artificial intelligence infrastructures. However, the migration of sensitive workloads to the cloud raises a fundamental challenge: how to trust the infrastructure executing these workloads. Traditional security approaches address only part of this problem. Cryptographic mechanisms protect sensitive data, while Trusted Execution Environments aim to isolate computations. Organizational frameworks and sovereign cloud initiatives improve operational governance of cloud infrastructures. Despite these advances, the core architectural challenge remains unresolved: establishing strong trust guarantees for workloads executed on complex infrastructures that cannot be entirely verified. In previous work we introduced the concept of Trusted Security Governance Platforms (TSGP), programmable trust anchors capable of governing security-critical operations across complex digital ecosystems. This paper introduces ProvenCloud, an architecture applying these principles to cloud infrastructures through the concept of Trusted Cloud Enclaves (TCE). Trusted Cloud Enclaves establish controlled execution perimeters around compute environments such as virtual machines, container clusters or bare-metal nodes. These enclaves act as trusted governance components mediating interactions between sensitive workloads and the surrounding infrastructure. By concentrating security-critical functions within minimal and strongly verifiable components, the architecture enables independent governance of infrastructure interactions while drastically reducing the trusted computing base of the execution environment.

Keywords

Supply Chain Security, Secure Execution Environments, Trusted Cloud Enclave, Infrastructure Security, Security Governance, Reference Monitor, Trusted Security Governance Platform, Secure Cloud Architecture, High-Assurance Systems, Confidential Computing, Cloud Security

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
Upload OA version
Are you the author of this publication? Upload your Open Access version to Zenodo!
It’s fast and easy, just two clicks!