Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article
Free access

Toward confidential cloud computing

Published: 24 May 2021 Publication History

Abstract

Extending hardware-enforced cryptographic protection to data while in use.

References

[1]
AWS Nitro Enclaves. AWS; https://aws.amazon.com/ec2/nitro/nitro-enclaves/.
[2]
Baumann, A., Peinado, M., Hunt, G. Shielding applications from an untrusted cloud with Haven. In Proceedings of the 11th Usenix Symp. Operating Systems Design and Implementation, 2014; https://www.usenix.org/conference/osdi14/technical-sessions/presentation/baumann.
[3]
Carruth, C. Speculative load hardening. LLVM Compiler Infrastructure, 2018; https://llvm.org/docs/SpeculativeLoadHardening.html.
[4]
Confidential Consortium Framework. GitHub; https://github.com/microsoft/CCF.
[5]
Ohrimenko, O. et al. Oblivious multi-party machine learning on trusted processors. In Proceedings of the 25th Usenix Security Symp., 2016; 619--636; https://dl.acm.org/doi/10.5555/3241094.3241143.
[6]
Open Enclave SDK. GitHub; https://github.com/openenclave/openenclave.
[7]
Priebe, C., Vaswani, K. and Costa, M. EnclaveDB: a secure database using SGX. In Proceedings of the 2018 IEEE Symp. Security and Privacy; https://ieeexplore.ieee.org/document/8418608.
[8]
Qureshi, M.K. New attacks and defense for encrypted-address cache. In Proceedings of the 46th Intern. Symp. Computer Architecture, 2019, 360--371; https://dl.acm.org/doi/10.1145/3307650.3322246.
[9]
Sakalis, C. et al. Efficient invisible speculative execution through selective delay and value prediction. In Proceedings of the 2019 Intern. Symp. Computer Architecture; https://www.researchgate.net/publication/333755760_Efficient_Invisible_Speculative_Execution_through_Selective_Delay_and_Value_Prediction.
[10]
Schuster, F. et al. VC3: trustworthy data analytics in the cloud using SGX. In Proceedings of the 2010 IEEE Symp. Security and Privacy, 38--54; https://dl.acm.org/doi/10.1109/SP.2015.10.
[11]
SGX-LKL. GitHub; https://github.com/lsds/sgx-lkl.
[12]
Volos, S. et al. Graviton: Trusted execution environments on GPUs. In Proceedings of the 13th Usenix Symp. Operating Systems Design and Implementation, 2018; https://www.usenix.org/system/files/osdi18-volos.pdf.
[13]
Werner, M. et al. ScatterCache: Thwarting cache attacks via cache set randomization. Proceedings of the 28th Usenix Security Symposium, 2019; https://www.usenix.org/system/files/sec19-werner.pdf.
[14]
Yan, M. et al. InvisiSpec: Making speculative execution invisible in the cache hierarchy. In Proceedings of the 51st Annual IEEE/ACM Intern. Symp. Microarchitecture, 2018; https://iacoma.cs.uiuc.edu/iacoma-papers/micro18.pdf.

Cited By

View all
  • (2024)Multi-Platform and Vault-Free Attestation of Confidential VMsProceedings of the 13th Latin-American Symposium on Dependable and Secure Computing10.1145/3697090.3698036(241-251)Online publication date: 26-Nov-2024
  • (2024)Trustworthy AI Using Confidential Federated LearningCommunications of the ACM10.1145/367739067:9(48-53)Online publication date: 15-Aug-2024
  • (2024)Machine Learning with Confidential Computing: A Systematization of KnowledgeACM Computing Surveys10.1145/367000756:11(1-40)Online publication date: 29-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 64, Issue 6
June 2021
106 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3467845
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 May 2021
Published in CACM Volume 64, Issue 6

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article
  • Popular
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,128
  • Downloads (Last 6 weeks)151
Reflects downloads up to 20 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Multi-Platform and Vault-Free Attestation of Confidential VMsProceedings of the 13th Latin-American Symposium on Dependable and Secure Computing10.1145/3697090.3698036(241-251)Online publication date: 26-Nov-2024
  • (2024)Trustworthy AI Using Confidential Federated LearningCommunications of the ACM10.1145/367739067:9(48-53)Online publication date: 15-Aug-2024
  • (2024)Machine Learning with Confidential Computing: A Systematization of KnowledgeACM Computing Surveys10.1145/367000756:11(1-40)Online publication date: 29-Jun-2024
  • (2024)Trustworthy AI using Confidential Federated LearningQueue10.1145/366522022:2(87-107)Online publication date: 24-May-2024
  • (2024)Proof of Unlearning: Definitions and InstantiationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.335899319(3309-3323)Online publication date: 1-Jan-2024
  • (2024)A Novel Real-Time Machine Translation System based on Cloud LM Algorithm2024 International Conference on Expert Clouds and Applications (ICOECA)10.1109/ICOECA62351.2024.00017(19-23)Online publication date: 18-Apr-2024
  • (2023)Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High AvailabilityProceedings of the VLDB Endowment10.14778/3626292.362630417:2(225-240)Online publication date: 1-Oct-2023
  • (2023)Why Should I Trust Your Code?Communications of the ACM10.1145/362457867:1(68-76)Online publication date: 21-Dec-2023
  • (2023)Confidential Computing: Elevating Cloud Security and PrivacyCommunications of the ACM10.1145/362457767:1(52-53)Online publication date: 21-Dec-2023
  • (2023)Hardware VM Isolation in the CloudCommunications of the ACM10.1145/362457667:1(54-59)Online publication date: 21-Dec-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media