Confidential Computing in the Cloud: An Overview

Authors

  • Goutham Sabbani

DOI:

https://doi.org/10.47941/ijce.2179

Keywords:

Confidential Computing, Data Privacy, Cloud Security, Cryptographic Techniques

Abstract

Major financial institutions like Goldman Sachs and JP Morgan have employed these hardware-based trusted execution environments (TEEs) and reported a 50% reduction in data breaches and a 40% increase in customer trust. Daily, these companies do billions of transactions in the cloud, leveraging confidentiality computing to ensure the privacy and integrity of their sensitive data. Over the years, confidential computing has evolved significantly, and the emergence of technology to safeguard sensitive information from malicious insiders and external threats now encompasses advanced and complex cryptographic techniques and hardware innovations, offering robust security assurances for cloud-based operations. In this paper, we will talk about foundational technologies and implementation strategies for the core of confidential computing. We will explore benefits, including performance trade-offs and integration complexities. Furthermore, the paper will highlight real-world applications and use cases, showcasing how industries such as finance, healthcare, and government leverage confidential computing to enhance data security and complicate cloud environments.

Downloads

Download data is not yet available.

Author Biography

Goutham Sabbani

MSc FinTech (UK), MA ITM (US)

References

Archer, D. W., de Balle Pigem, B., Bogdanov, D., Craddock, M., Gascón, A., Jansen, R., Jug, M., Laine, K., McLellan, R. K., Ohrimenko, O., Raykova, M., Trask, A., & Wardley, S. (2021). [UN Handbook on Privacy-Preserving Computation Techniques] (https://export.arxiv.org/pdf/2301.06167v1.pdf). United Nations.

Chen, K. (2021). [Confidential High-Performance Computing in the Public Cloud] (https://export.arxiv.org/pdf/2212.02378v1.pdf). Marquette University.

Cummings, R., Desfontaines, D., Evans, D., Geambasu, R., Jagielski, M., Huang, Y., Kairouz, P., Kamath, G., Oh, S., Ohrimenko, O., Papernot, N., Rogers, R., Shen, M., Song, S., Su, W., Terzis, A., Thakurta, A., Vassilvitskii, S., Wang, Y., Xiong, L., Yekhanin, S., Yu, D., & Zhang, H. (2021). [Challenges towards the Next Frontier in Privacy] (https://arxiv.org/abs/2304.06929). Columbia University.

Russinovich, M., Costa, M., Fournet, C., Chisnall, D., Delignat-Lavaud, A., & Clebsch, S. (2021). [Toward Confidential Cloud Computing] (https://dl.acm.org/doi/10.1145/3453930). ACM.

Williams, M., Axon, L., Nurse, J. R. C., & Creese, S. (2016). [Future Scenarios and Challenges for Security and Privacy] (https://arxiv.org/pdf/1807.05746v1.pdf). University of Oxford.

Zobaed, S. M., & Salehi, M. A. (2021). [Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study] (https://export.arxiv.org/pdf/2307.16447v1.pdf). Arxiv.

Akram, A., Akella, V., Peisert, S., & Lowe-Power, J. (2021). [SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems] (https://ieeexplore.ieee.org/document/9935045/). IEEE.

Confidential Computing Consortium. (2020). [Confidential Computing Deep Dive] (https://confidentialcomputing.io/wp-content/uploads/sites/85/2020/10/Confidential-Computing-Deep-Dive-white-paper.pdf). Confidential Computing Consortium.

Downloads

Published

2024-08-06

How to Cite

Sabbani, G. (2024). Confidential Computing in the Cloud: An Overview. International Journal of Computing and Engineering, 6(3), 43–48. https://doi.org/10.47941/ijce.2179

Issue

Section

Articles