DocumentCode
1782769
Title
Enabling Trusted Data-intensive execution in cloud computing
Author
Ning Zhang ; Wenjing Lou ; Xuxian Jiang ; Hou, Y.T.
Author_Institution
Virginia Polytech. Inst. & State Univ., Blacksburg, VA, USA
fYear
2014
fDate
29-31 Oct. 2014
Firstpage
355
Lastpage
363
Abstract
The security and privacy of user data has become a major concern in the cloud computing era. Cryptographic solutions based on secure computation outsourcing have been extensively studied in order to protect the security and privacy of user data. However, these solutions either suffer from forbiddingly high computation overhead or are only applicable to certain special classes of computations. In this paper, we tackle the challenge of secure computation outsourcing using an entirely different approach - the idea is to have a secure execution environment in the cloud such that user data can be processed in plain text format without compromising its confidentiality. We propose a TrUsted Data-intensive ExeCution (TUDEC) environment optimized for data applications in the cloud. TUDEC is a new system architecture, designed to provide a secure environment for arbitrary data computations in the cloud server. Using a very small trusted computing base including only firmware and hardware, TUDEC is able to provide user VM with isolation against both the legacy host and neighboring VMs. Such isolation is unique in that it provides protection against any software-based attacks. By direct interrupt delivery, interrupt rerouting and IOMMU configuration lock, TUDEC enables close to bare metal computation and I/O performance without sacrificing any security guaranteed. We built a prototype and showed the high efficiency of TUDEC. In particular, when the server is heavily loaded, the TCP bandwidth of the guest VM in TUDEC is significantly better than the current state of art secure execution environment design.
Keywords
computer architecture; cryptography; data privacy; firmware; outsourcing; IOMMU configuration lock; TUDEC environment; arbitrary data computations; cloud computing; cloud server; cryptographic; data privacy; data security; firmware; interrupt rerouting; secure computation outsourcing; software-based attacks; system architecture; trusted data-intensive execution environment; Hardware; Registers; Security; Servers; Virtual machine monitors; Virtual machining; Virtualization;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications and Network Security (CNS), 2014 IEEE Conference on
Conference_Location
San Francisco, CA
Type
conf
DOI
10.1109/CNS.2014.6997504
Filename
6997504
Link To Document