Confidential Computing in the Cloud: An Overview
DOI:
https://doi.org/10.47941/ijce.2179Keywords:
Confidential Computing, Data Privacy, Cloud Security, Cryptographic TechniquesAbstract
Major financial institutions like Goldman Sachs and JP Morgan have employed these hardware-based trusted execution environments (TEEs) and reported a 50% reduction in data breaches and a 40% increase in customer trust. Daily, these companies do billions of transactions in the cloud, leveraging confidentiality computing to ensure the privacy and integrity of their sensitive data. Over the years, confidential computing has evolved significantly, and the emergence of technology to safeguard sensitive information from malicious insiders and external threats now encompasses advanced and complex cryptographic techniques and hardware innovations, offering robust security assurances for cloud-based operations. In this paper, we will talk about foundational technologies and implementation strategies for the core of confidential computing. We will explore benefits, including performance trade-offs and integration complexities. Furthermore, the paper will highlight real-world applications and use cases, showcasing how industries such as finance, healthcare, and government leverage confidential computing to enhance data security and complicate cloud environments.
Downloads
References
Archer, D. W., de Balle Pigem, B., Bogdanov, D., Craddock, M., Gascón, A., Jansen, R., Jug, M., Laine, K., McLellan, R. K., Ohrimenko, O., Raykova, M., Trask, A., & Wardley, S. (2021). [UN Handbook on Privacy-Preserving Computation Techniques] (https://export.arxiv.org/pdf/2301.06167v1.pdf). United Nations.
Chen, K. (2021). [Confidential High-Performance Computing in the Public Cloud] (https://export.arxiv.org/pdf/2212.02378v1.pdf). Marquette University.
Cummings, R., Desfontaines, D., Evans, D., Geambasu, R., Jagielski, M., Huang, Y., Kairouz, P., Kamath, G., Oh, S., Ohrimenko, O., Papernot, N., Rogers, R., Shen, M., Song, S., Su, W., Terzis, A., Thakurta, A., Vassilvitskii, S., Wang, Y., Xiong, L., Yekhanin, S., Yu, D., & Zhang, H. (2021). [Challenges towards the Next Frontier in Privacy] (https://arxiv.org/abs/2304.06929). Columbia University.
Russinovich, M., Costa, M., Fournet, C., Chisnall, D., Delignat-Lavaud, A., & Clebsch, S. (2021). [Toward Confidential Cloud Computing] (https://dl.acm.org/doi/10.1145/3453930). ACM.
Williams, M., Axon, L., Nurse, J. R. C., & Creese, S. (2016). [Future Scenarios and Challenges for Security and Privacy] (https://arxiv.org/pdf/1807.05746v1.pdf). University of Oxford.
Zobaed, S. M., & Salehi, M. A. (2021). [Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study] (https://export.arxiv.org/pdf/2307.16447v1.pdf). Arxiv.
Akram, A., Akella, V., Peisert, S., & Lowe-Power, J. (2021). [SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems] (https://ieeexplore.ieee.org/document/9935045/). IEEE.
Confidential Computing Consortium. (2020). [Confidential Computing Deep Dive] (https://confidentialcomputing.io/wp-content/uploads/sites/85/2020/10/Confidential-Computing-Deep-Dive-white-paper.pdf). Confidential Computing Consortium.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Goutham Sabbani
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.