Practical and Efficient in-Enclave Verification of Privacy Compliance
- PMID: 35919377
- PMCID: PMC9343090
- DOI: 10.1109/dsn48987.2021.00052
Practical and Efficient in-Enclave Verification of Privacy Compliance
Abstract
A trusted execution environment (TEE) such as Intel Software Guard Extension (SGX) runs attestation to prove to a data owner the integrity of the initial state of an enclave, including the program to operate on her data. For this purpose, the data-processing program is supposed to be open to the owner or a trusted third party, so its functionality can be evaluated before trust being established. In the real world, however, increasingly there are application scenarios in which the program itself needs to be protected (e.g., proprietary algorithm). So its compliance with privacy policies as expected by the data owner should be verified without exposing its code. To this end, this paper presents Deflection, a new model for TEE-based delegated and flexible in-enclave code verification. Given that the conventional solutions do not work well under the resource-limited and TCB-frugal TEE, we come up with a new design inspired by Proof-Carrying Code. Our design strategically moves most of the workload to the code generator, which is responsible for producing easy-to-check code, while keeping the consumer simple. Also, the whole consumer can be made public and verified through a conventional attestation. We implemented this model on Intel SGX and demonstrate that it introduces a very small part of TCB. We also thoroughly evaluated its performance on micro- and macro- benchmarks and real-world applications, showing that the design only incurs a small overhead when enforcing several categories of security policies.
Keywords: Confidential Computing; Enclave Shielding Runtime; Intel SGX; Proof-Carrying Code.
Figures
Similar articles
-
HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework.IEEE Int Conf Cloud Comput. 2021 Sep;2021:733-743. doi: 10.1109/CLOUD53861.2021.00098. Epub 2021 Nov 13. IEEE Int Conf Cloud Comput. 2021. PMID: 35662807 Free PMC article.
-
eTPM: A Trusted Cloud Platform Enclave TPM Scheme Based on Intel SGX Technology.Sensors (Basel). 2018 Nov 6;18(11):3807. doi: 10.3390/s18113807. Sensors (Basel). 2018. PMID: 30404242 Free PMC article.
-
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.IEEE Trans Dependable Secure Comput. 2023 Jan-Feb;20(1):522-538. doi: 10.1109/tdsc.2021.3138427. Epub 2021 Dec 28. IEEE Trans Dependable Secure Comput. 2023. PMID: 38152698 Free PMC article.
-
Security policies and trust in ubiquitous computing.Philos Trans A Math Phys Eng Sci. 2008 Oct 28;366(1881):3769-80. doi: 10.1098/rsta.2008.0142. Philos Trans A Math Phys Eng Sci. 2008. PMID: 18672450 Review.
-
State-of-the-Art Software-Based Remote Attestation: Opportunities and Open Issues for Internet of Things.Sensors (Basel). 2021 Feb 25;21(5):1598. doi: 10.3390/s21051598. Sensors (Basel). 2021. PMID: 33668796 Free PMC article. Review.
References
-
- McKeen F, Alexandrovich I, Berenzon A, Rozas CV, Shafi H,Shanbhogue V, and Savagaonkar UR, “Innovative Instructions and Software Model for Isolated Execution.” HASP, vol. 10, no. 1, 2013
-
- Russinovich M, “Introducing Azure Confidential Computing,” Seattle, WA: Microsoft, 2017.
-
- “Google. Asylo,” 2019. [Online]. Available: https://asylo.dev/
-
- “Confidential Computing Consortium,” 2019. [Online]. Available: https://confidentialcomputing.io
-
- Zhang Z, Ding X, Tsudik G, Cui J, and Li Z, “Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017, pp. 89–102.
Grants and funding
LinkOut - more resources
Full Text Sources
Other Literature Sources