• DocumentCode
    1782769
  • Title

    Enabling Trusted Data-intensive execution in cloud computing

  • Author

    Ning Zhang ; Wenjing Lou ; Xuxian Jiang ; Hou, Y.T.

  • Author_Institution
    Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
  • fYear
    2014
  • fDate
    29-31 Oct. 2014
  • Firstpage
    355
  • Lastpage
    363
  • Abstract
    The security and privacy of user data has become a major concern in the cloud computing era. Cryptographic solutions based on secure computation outsourcing have been extensively studied in order to protect the security and privacy of user data. However, these solutions either suffer from forbiddingly high computation overhead or are only applicable to certain special classes of computations. In this paper, we tackle the challenge of secure computation outsourcing using an entirely different approach - the idea is to have a secure execution environment in the cloud such that user data can be processed in plain text format without compromising its confidentiality. We propose a TrUsted Data-intensive ExeCution (TUDEC) environment optimized for data applications in the cloud. TUDEC is a new system architecture, designed to provide a secure environment for arbitrary data computations in the cloud server. Using a very small trusted computing base including only firmware and hardware, TUDEC is able to provide user VM with isolation against both the legacy host and neighboring VMs. Such isolation is unique in that it provides protection against any software-based attacks. By direct interrupt delivery, interrupt rerouting and IOMMU configuration lock, TUDEC enables close to bare metal computation and I/O performance without sacrificing any security guaranteed. We built a prototype and showed the high efficiency of TUDEC. In particular, when the server is heavily loaded, the TCP bandwidth of the guest VM in TUDEC is significantly better than the current state of art secure execution environment design.
  • Keywords
    computer architecture; cryptography; data privacy; firmware; outsourcing; IOMMU configuration lock; TUDEC environment; arbitrary data computations; cloud computing; cloud server; cryptographic; data privacy; data security; firmware; interrupt rerouting; secure computation outsourcing; software-based attacks; system architecture; trusted data-intensive execution environment; Hardware; Registers; Security; Servers; Virtual machine monitors; Virtual machining; Virtualization;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications and Network Security (CNS), 2014 IEEE Conference on
  • Conference_Location
    San Francisco, CA
  • Type

    conf

  • DOI
    10.1109/CNS.2014.6997504
  • Filename
    6997504