SE-PIM: In-Memory Acceleration of Data-Intensive Confidential Computing

被引:1
作者
Duy, Kha Dinh [1 ]
Lee, Hojoon [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Sci & Engn, Seoul 03063, South Korea
关键词
Cloud computing; Computer architecture; Memory management; Computational modeling; Hardware; Random access memory; Computational efficiency; Processor-in-memory; confidential computing;
D O I
10.1109/TCC.2022.3207145
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Demand for data-intensive workloads and confidential computing are the prominent research directions shaping the future of cloud computing. Computer architectures are evolving to accommodate the computing of large data. Meanwhile, a plethora of works has explored protecting the confidentiality of the in-cloud computation in the context of hardware-based secure enclaves. However, the approach has faced challenges in achieving efficient large data computation. In this article, we present a novel design, called se-pim, that retrofits Processing-In-Memory (PIM) as a data-intensive confidential computing accelerator. PIM-accelerated computation renders large data computation highly efficient by minimizing data movement. Based on our observation that moving computation closer to memory can achieve efficiency of computation and confidentiality of the processed information simultaneously, we study the advantages of confidential computing inside memory. We construct our findings into a software-hardware co-design called se-pim. Our design illustrates the advantages of PIM-based confidential computing acceleration. We study the challenges in adapting PIM in confidential computing and propose a set of imperative changes, as well as a programming model that can utilize them. Our evaluation shows se-pim can provide a side-channel resistant secure computation offloading and run data-intensive applications with negligible performance overhead compared to the baseline PIM model.
引用
收藏
页码:2473 / 2490
页数:18
相关论文
共 74 条
[41]   Design and Implementation of an Advanced DMA Controller on AMBA-Based SoC [J].
Ma, Guoliang ;
He, Hu .
2009 IEEE 8TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2009, :419-422
[42]  
McKeen F., 2013, P 2 INT WORKSHOP HAR, DOI DOI 10.1145/2487726.2488368
[43]  
Micron Technology, 2014, DDR4 SDRAM
[44]  
Microsoft Azure, 2021, Azure confidential computing
[45]  
Moghaddam H. A., 2016, P 49 ANN IEEE ACM IN, P1
[46]  
Moghimi A, 2017, Arxiv, DOI arXiv:1703.06986
[47]   RowHammer: A Retrospective [J].
Mutlu, Onur ;
Kim, Jeremie S. .
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 39 (08) :1555-1571
[48]   INVITED: Enabling Practical Processing in and near Memory for Data-Intensive Computing [J].
Mutlu, Onur ;
Ghose, Saugata ;
Gomez-Luna, Juan ;
Ausavarungnirun, Rachata .
PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
[49]  
Mutlu Onur, 2020, arXiv
[50]   Common Counters: Compressed Encryption Counters for Secure GPU Memory [J].
Na, Seonjin ;
Lee, Sunho ;
Kim, Yeonjae ;
Park, Jongse ;
Huh, Jaehyuk .
2021 27TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE COMPUTER ARCHITECTURE (HPCA 2021), 2021, :1-13