Hardware-based solutions for trusted cloud computing

被引:11
作者
Demigha, Oualid [1 ]
Larguet, Ramzi [1 ]
机构
[1] Ecole Mil Polytech, POB 17, Algiers 16111, Algeria
关键词
Trusted cloud computing; Hardware-assisted security; Trusted execution environment; Intel TXT; AMD SEV; ARM TrustZone; Intel SGX; ARM; TRUSTZONE; SECURITY;
D O I
10.1016/j.cose.2020.102117
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing number of threats targeting cloud computing and the exploitation of specifically privileged software vulnerabilities have pushed the security managers of cloud service providers to deploy hardware-based solutions. These solutions can offer better hardwareassisted security features for a broad range of computing platforms including both CISC and RISC architecture families in datacenters. Their goal is to reduce the attack surface by rooting the trust into the hardware instead of some high-privileged pieces of system software such as the operating system or the hypervisor which have been demonstrated that they include severe security vulnerabilities, thus limiting the adoption of the cloud computing model for some security-skeptical users. In this paper, we give cloud users and customers, application developers and security managers a comprehensive overview of four major industrial-scale commercial hardware-based solutions brought by major vendors in the cloud market. We present, analyze and compare Intel TXT, ARM TrustZone, AMD SEV, and Intel SGX technologies with respect to more than twenty criteria fitting within three categories: security, functional and deployment. We discuss each of these technologies and show the cases where they particularly excel. Our comparison can help IT managers to take the right decision about which better industrial technology to adopt for their particular security requirements and future cloud migrations. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:18
相关论文
共 73 条
  • [41] PrOS: Light-Weight Privatized Se cure OSes in ARM TrustZone
    Kwon, Donghyun
    Seo, Jiwon
    Cho, Yeongpil
    Lee, Byoungyoung
    Paek, Yunheung
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2020, 19 (06) : 1434 - 1447
  • [42] Lee RB, P 7 INT C ARCH SUPP
  • [43] Lesjak C, 2015, IEEE IND ELEC, P2589, DOI 10.1109/IECON.2015.7392493
  • [44] Hardware-Based Trusted Computing Architectures for Isolation and Attestation
    Maene, Pieter
    Gotzfried, Johannes
    de Clercq, Ruan
    Mueller, Tilo
    Freiling, Felix
    Verbauwhede, Ingrid
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2018, 67 (03) : 361 - 374
  • [45] Maniatis P, 2017, P 16 WORKSH HOT TOP
  • [46] Optimized Cloud Deployment of Multi-tenant Software Considering Data Protection Concerns
    Mann, Zoltan Adam
    Metzger, Andreas
    [J]. 2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, : 609 - 618
  • [47] A survey on security issues and solutions at different layers of Cloud computing
    Modi, Chirag
    Patel, Dhiren
    Borisaniya, Bhavesh
    Patel, Avi
    Rajarajan, Muttukrishnan
    [J]. JOURNAL OF SUPERCOMPUTING, 2013, 63 (02) : 561 - 592
  • [48] A Comparison Study of Intel SGX and AMD Memory Encryption Technology
    Mofrad, Saeid
    Zhang, Fengwei
    Lu, Shiyong
    Shi, Weidong
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY (HASP '18), 2018,
  • [49] Mulnix DL, 2015, INTEL TRUSTED EXECUT, V2
  • [50] Mutlu O., 2019, COMPUT SCI