Secret Sharing in Pub/Sub Using Trusted Execution Environments

被引:2
|
作者
Munster, Javier [1 ]
Jacobsen, Hans-Arno [1 ]
机构
[1] Univ Toronto, Middleware Syst Res Grp, Toronto, ON, Canada
来源
DEBS'18: PROCEEDINGS OF THE 12TH ACM INTERNATIONAL CONFERENCE ON DISTRIBUTED AND EVENT-BASED SYSTEMS | 2018年
基金
加拿大自然科学与工程研究理事会;
关键词
Publish/Subscribe; key management; confidentiality; secret sharing; Intel SGX; DESIGN;
D O I
10.1145/3210284.3210290
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An essential security concern in the publish/subscribe paradigm is that of guaranteeing the confidentiality of the data being transmitted. Existing solutions require that some initial parameters, keys or secrets be exchanged or otherwise established between communicating entities before secure end-to-end communication can occur. Most existing solutions in the literature either weaken the desirable decoupling properties of pub/sub or rely on a completely trusted out-of-band service to disseminate these values. This problem can be avoided through the use of Shamir's secret sharing scheme, at the cost of a prohibitively large number of messages, scaling exponentially with the path length between publisher and subscriber. Intel's Software Guard Extensions (SGX) offers trusted execution environments to shield application data from untrusted software running at a higher privilege level. Unfortunately, SGX requires the use of Intel's proprietary hardware and architecture. We mitigate these problems through HyShare, a hybrid broker network used for the purposes of sharing a secret between communicating publishers and subscribers. The broker network is composed of regular brokers that use Shamir's secret sharing scheme and brokers with SGX to reduce the overall number of messages needed to share a secret. By fine tuning the combination of these brokers, it is possible to strike a balance between network resource use and hardware heterogeneity.
引用
收藏
页码:28 / 39
页数:12
相关论文
共 50 条
  • [1] Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments
    Birgersson, Marcus
    Artho, Cyrille
    Balliu, Musard
    2024 IEEE SECURE DEVELOPMENT CONFERENCE, SECDEV 2024, 2024, : 105 - 116
  • [2] Obscuro: A Bitcoin Mixer using Trusted Execution Environments
    Tran, Muoi
    Luu, Loi
    Kang, Min Suk
    Bentov, Iddo
    Saxena, Prateek
    34TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2018), 2018, : 692 - 701
  • [3] DELEGATEE: Brokered Delegation Using Trusted Execution Environments
    Matetic, Sinisa
    Schneider, Moritz
    Miller, Andrew
    Juels, Ari
    Capkun, Srdjan
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1387 - 1403
  • [4] A framework for application partitioning using trusted execution environments
    Atamli-Reineh, Ahmad
    Paverd, Andrew
    Petracca, Giuseppe
    Martin, Andrew
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [5] An Ambient Intelligence approach to provide secure and trusted Pub/Sub messaging systems in IoT environments
    Rathee, Geetanjali
    Kerrache, Chaker Abdelaziz
    Calafate, Carlos T.
    COMPUTER NETWORKS, 2022, 218
  • [6] SafeKeeper: Protecting Web Passwords using Trusted Execution Environments
    Krawiecka, Klaudia
    Kurnikov, Arseny
    Paverd, Andrew
    Mannan, Mohammad
    Asokan, N.
    WEB CONFERENCE 2018: PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE (WWW2018), 2018, : 349 - 358
  • [7] Graviton: Trusted Execution Environments on GPUs
    Volos, Stavros
    Vaswani, Kapil
    Bruno, Rodrigo
    PROCEEDINGS OF THE 13TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, 2018, : 681 - 696
  • [8] Secure and Efficient Mobile DNN Using Trusted Execution Environments
    Hu, Bin
    Wang, Yan
    Cheng, Jerry
    Zhao, Tianming
    Xie, Yucheng
    Guo, Xiaonan
    Chen, Yingying
    PROCEEDINGS OF THE 2023 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ASIA CCS 2023, 2023, : 274 - 285
  • [9] Time to Rethink: Trust Brokerage Using Trusted Execution Environments
    Koeberl, Patrick
    Phegade, Vinay
    Rajan, Anand
    Schneider, Thomas
    Schulz, Steffen
    Zhdanova, Maria
    TRUST AND TRUSTWORTHY COMPUTING, TRUST 2015, 2015, 9229 : 181 - 190
  • [10] Building Open Trusted Execution Environments
    Kohlbrenner, David
    Shinde, Shweta
    Lee, Dayeol
    Asanovic, Krste
    Song, Dawn
    IEEE SECURITY & PRIVACY, 2020, 18 (05) : 47 - 56