Stream Processing with Adaptive Edge-Enhanced Confidential Computing

被引:0
作者
Yan, Yuqin [1 ]
Mishra, Pritish [1 ]
Huang, Wei [1 ]
Mehta, Aastha [2 ]
Balmau, Oana [3 ]
Lie, David [1 ]
机构
[1] Univ Toronto, Toronto, ON, Canada
[2] Univ British Columbia, Vancouver, BC, Canada
[3] McGill Univ, Montreal, PQ, Canada
来源
7TH INTERNATIONAL WORKSHOP ON EDGE SYSTEMS, ANALYTICS AND NETWORKING, EDGESYS 2024 | 2024年
关键词
Security; Data Streaming; Trusted Execution Environment; Confidential Computing; Stream Processing Framework;
D O I
10.1145/3642968.3654819
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Stream processing is becoming increasingly significant in various scenarios, including security-sensitive sectors. It benefits from keeping data in memory, which exposes large volumes of data in use, thereby emphasising the need for protection. The recent development of confidential computing makes such protection technologically feasible. However, these new hardware-based protection methods incur performance overhead. Our evaluation shows that replacing legacy VMs with confidential VMs to run streaming applications incurs up to 8.5% overhead on the throughput of the queries we tested in the NEXMark benchmark suite. Pursuing specialised protection for broader attacks, such as attacks at the edge with more physical exposure, can push this overhead further. In this paper, we propose a resource scheduling strategy for stream processing applications tailored to the privacy needs of specific application functions. We implement this system model using Apache Flink, a widely-used stream processing framework, making it aware of the underlying cluster's protection capability and scheduling the application functions across resources with different protections tailored to the privacy requirements of an application and the available deployment environment.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 17 条
  • [1] Aga S, 2017, 44TH ANNUAL INTERNATIONAL SYMPOSIUM ON COMPUTER ARCHITECTURE (ISCA 2017), P94, DOI [10.1145/3140659.3080232, 10.1145/3079856.3080232]
  • [2] AMD Sev-Snp, 2020, White Paper, V53, P1450
  • [3] [Anonymous], 2024, Nexmark Benchmark
  • [4] [Anonymous], 2024, Yahoo Streaming Benchmark
  • [5] Apache Flink, 2024, BlackHole SQL Connector
  • [6] Carbone P., 2015, IEEE Data Eng. Bull., V38, P28, DOI DOI 10.1109/IC2EW.2016.56
  • [7] Cheng PC, 2023, Arxiv, DOI arXiv:2303.15540
  • [8] SecDDR: Enabling Low-Cost Secure Memories by Protecting the DDR Interface
    Fakhrzadehgan, Ali
    Ramrakhyani, Prakash
    Qureshi, Moinuddin K.
    Erez, Mattan
    [J]. 2023 53RD ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, DSN, 2023, : 14 - 27
  • [9] Kaplan David, 2016, CISC VIS NETW IND GL, P13
  • [10] Lee D, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P487