integrity and availability

Encryption keys stored in the hard disk are susceptible to tampering. TPM solutions offer a protected storage of keys through hardware and protection of authentication credentials by binding them to the platform, providing a stronger mechanism to prevent unauthorized access to the platform and thus, the integrity of the data stored. Authentication built on top of trusted computing services (based on the use of TPMs) provides higher degrees of assurance, but performance overheads introduced can be significant.

One important feature that remains an open challenge and which we strive to assure is cloud verifiability. That is, providing cloud customers with necessary means to obtain evidence of the compliance of the services they purchase with the security and the privacy requirements mandated by regulations or SLAs. In the case of computation outsourcing, cloud customers are also interested in solutions that grant them the capability of verifying the correctness of the computations conducted by the cloud service providers.