Notes about <VC3: Trustworthy Data Analytics in the Cloud using SGX>

介绍Verifiable Confidential Cloud Computing (VC3),一种确保云中数据与代码机密性和完整性的MapReduce框架。该框架能抵御强大的攻击者,并通过SGX处理器保护代码免受操作系统和虚拟机管理程序的访问。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

Introduction

Typically, cloud users
hope for the following security guarantees:
I Confidentiality and integrity for both code and data; i. e.,
the guarantee that they are not changed by attackers and
that they remain secret.
II Verifiability of execution of the code over the data; i. e.,
the guarantee that their distributed computation globally
ran to completion and was not tampered with.

We present Verifiable Confidential Cloud Computing (VC3),
a MapReduce framework that achieves the security guarantees
(I and II) formulated above, with good performance.

Our threat model accounts for powerful adversaries that may control
the whole cloud provider’s software and hardware infrastructure,
except for the certified physical processors involved in
the computation.

Denial-of-service, side-channels, and trafficanalysis
attacks are outside the scope of this work.

  • To keep the TCB small in our design, users simply write the usual map and reduce functions in C++, encrypt them, bind them to a small amount of code that implements our cryptographic protocols, and finally upload the code to the cloud.
    On each worker node, the cloud operating system loads the code into a secure region within the address space of a process and makes use of the security mechanisms of SGX processors to make the region inaccessible to the operating system and the
    hypervisor.
    Subsequently, the code inside the region runs our key exchange protocol, decrypts the map and reduce functions, and runs the distributed computation that processes the data.

    • The second challenge is to guarantee integrity for the whole
      distributed computation, since the processors guarantee only
      integrity of memory regions on individual computers.

    • The final challenge is to protect the code running in the
      isolated memory regions from attacks due to unsafe memory
      accesses.

Background

Cryptographic Assumptions

  • EDigest(C) : for the SGX digest of an enclave’s initial content C. We refer to C as the code identity of an enclave. Intuitively, EDigest provides collision resistance;
  • ESigp[C]{text}: for a quote from a QE with identity P that jointly signs H(text) and the EDigest(C) on behalf of an enclave with code identity C.
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值