
Cloud computing infrastructures have become the dominant platform for modern digital systems. Governments, industries and technology companies increasingly rely on cloud environments to host critical workloads, including financial systems, industrial platforms and artificial intelligence infrastructures. However, the migration of sensitive workloads to the cloud raises a fundamental challenge: how to trust the infrastructure executing these workloads. Traditional security approaches address only part of this problem. Cryptographic mechanisms protect sensitive data, while Trusted Execution Environments aim to isolate computations. Organizational frameworks and sovereign cloud initiatives improve operational governance of cloud infrastructures. Despite these advances, the core architectural challenge remains unresolved: establishing strong trust guarantees for workloads executed on complex infrastructures that cannot be entirely verified. In previous work we introduced the concept of Trusted Security Governance Platforms (TSGP), programmable trust anchors capable of governing security-critical operations across complex digital ecosystems. This paper introduces ProvenCloud, an architecture applying these principles to cloud infrastructures through the concept of Trusted Cloud Enclaves (TCE). Trusted Cloud Enclaves establish controlled execution perimeters around compute environments such as virtual machines, container clusters or bare-metal nodes. These enclaves act as trusted governance components mediating interactions between sensitive workloads and the surrounding infrastructure. By concentrating security-critical functions within minimal and strongly verifiable components, the architecture enables independent governance of infrastructure interactions while drastically reducing the trusted computing base of the execution environment.
Supply Chain Security, Secure Execution Environments, Trusted Cloud Enclave, Infrastructure Security, Security Governance, Reference Monitor, Trusted Security Governance Platform, Secure Cloud Architecture, High-Assurance Systems, Confidential Computing, Cloud Security
Supply Chain Security, Secure Execution Environments, Trusted Cloud Enclave, Infrastructure Security, Security Governance, Reference Monitor, Trusted Security Governance Platform, Secure Cloud Architecture, High-Assurance Systems, Confidential Computing, Cloud Security
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
