| CPC G06F 21/57 (2013.01) | 16 Claims |

|
1. A secure cloud computing architecture comprising:
a first execution space (A) for data management and/or computer program execution in which the management of the data and/or the execution of the programs is/are controlled by a user; and
a second execution space (B) for data management and/or computer program execution in which the management of the data or the execution of the programs is controlled by a third-party operator;
first security policies (PSA) applied to the data or to the execution of the programs in the first execution space (A);
second security policies (PSB) applied to the data or to the execution of the programs in the second execution space (B);
a security property (P) expected by the user, compliance with the first and second security policies guaranteeing data management and/or computer program execution in accordance with the security property (P); and
a trust base (TCB) guaranteeing, in the absence of violation, the application of the second security policies (PSB) in the management of the data and/or the execution of the programs in the second execution space (B),
wherein the trust base comprises:
a hardware part having observers indicating unauthorised access,
wherein the trust base comprises a hardware security module comprising the hardware part of the trust base, and
a software part, the software part being made available to the user and/or to a representative of the user and/or to a third party trusted by the user,
wherein the observers indicating unauthorised access are visible to the user and/or the representative of the user and/or the third party trusted by the user,
wherein means are provided to the user to enable the user to be convinced that all of the execution paths of the software part of the trust base guarantee compliance with the second security policies, under normal operating conditions,
wherein the architecture further includes a hardware part of the trust base forming an additional security module (BTA), the additional security module being disposed at the entrance of a subset of servers and having means for filtering data packets entering the subset, the filtration including checking up that the data packets comply with a security policy.
|