This document proposes a secure cloud architecture utilizing a hardware security module to isolate user data from potentially malicious cloud administrators, enhancing cloud security. The architecture ensures a secure connection, manages guest VMs, and minimizes the trusted computing base (TCB) by restricting access to sensitive data. The paper discusses implementations, analyzes security, and illustrates performance, addressing existing vulnerabilities in cloud computing.