I don't quite understand what you're trying to get at. Are you saying that cloud providers should provide you some sort of insured access to data in case something catastrophic happens, or are you saying that you should be able to store encrypted data in the cloud so the cloud provider or another authority cannot read it?<p>As for the former problem, cloud storage providers such as Amazon S3 already provide more redundancy for your data than you could possibly design cost-effectively on your own (in fact, they even offer a _reduced_ redundancy service if you don't want to pay for the S3 redundancy).<p>The latter "problem" isn't really a problem --- it's entirely up to you to encrypt the data you want to store in the cloud and keep the key to yourself, and you can easily have an encrypted frontend to your S3 block storage or even your Dropbox folder. I don't see the relevance of something like SUNDR... IIRC, it is a way to merely store your data on an untrusted service. However, most business use the cloud for <i>computation</i> (which of course requires storage). So SUNDR won't apply when you have to trust both computation and storage to an untrusted entity?<p>You could of course run a distribution on your compute node VM that encrypts data going out of the VM to the cloud provider infrastructure, but the benefit is limited because your applications are finally running on the provider's hardware. I suppose we need to wait until that homomorphic encryption stuff becomes real :)