Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data

被引:0
|
作者
Hunt, Tyler [1 ]
Zhu, Zhiting [1 ]
Xu, Yuanzhong [1 ]
Peter, Simon [1 ]
Witchel, Emmett [1 ]
机构
[1] Univ Texas Austin, Austin, TX 78712 USA
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Users of modern data-processing services such as tax preparation or genomic screening are forced to trust them with data that the users wish to keep secret. Ryoan protects secret data while it is processed by services that the data owner does not trust. Accomplishing this goal in a distributed setting is difficult because the user has no control over the service providers or the computational platform. Confining code to prevent it from leaking secrets is notoriously difficult, but Ryoan benefits from new hardware and a request-oriented data model. Ryoan provides a distributed sandbox, leveraging hardware enclaves (e.g., Intel's software guard extensions (SGX) [15]) to protect sandbox instances from potentially malicious computing platforms. The protected sandbox instances confine untrusted data-processing modules to prevent leakage of the user's input data. Ryoan is designed for a request-oriented data model, where confined modules only process input once and do not persist state about the input. We present the design and prototype implementation of Ryoan and evaluate it on a series of challenging problems including email filtering, heath analysis, image processing and machine translation.
引用
收藏
页码:533 / 549
页数:17
相关论文
共 50 条
  • [1] Ryoan: A Distributed Sandbox for Untrusted Computation on Secret Data
    Hunt, Tyler
    Zhu, Zhiting
    Xu, Yuanzhong
    Peter, Simon
    Witchel, Emmett
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2018, 35 (04):
  • [2] Entrusting Private Computation and Data to Untrusted Networks
    Brun, Yuriy
    Medvidovic, Nenad
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) : 225 - 238
  • [3] Efficient distributed computation modulo a shared secret
    Catalano, D
    [J]. CONTEMPORARY CRYPTOLOGY, 2005, : 1 - 39
  • [4] Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions
    Manes, Valentin J. M.
    Jang, Daehee
    Ryu, Chanho
    Kang, Brent Byunghoon
    [J]. COMPUTERS & SECURITY, 2018, 74 : 130 - 143
  • [5] Online computation with untrusted advice
    Angelopoulos, Spyros
    Durr, Christoph
    Jin, Shendan
    Kamali, Shahin
    Renault, Marc
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2024, 144
  • [6] The Role of an Untrusted Relay in Secret Communication
    He, Xiang
    Yener, Aylin
    [J]. 2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 2212 - 2216
  • [7] Data Summarization and Distributed Computation
    Cormode, Graham
    [J]. PODC'18: PROCEEDINGS OF THE 2018 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2018, : 167 - 168
  • [8] Verifiable Local Computation on Distributed Data
    Zhang, Liang Feng
    Safavi-Naini, Reihaneh
    Liu, Xiao Wei
    [J]. SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 3 - 10
  • [9] Native Client: A Sandbox for Portable, Untrusted x86 Native Code
    Yee, Bennet
    Sehr, David
    Dardyk, Gregory
    Chen, J. Bradley
    Muth, Robert
    Ormandy, Tavis
    Okasaka, Shiki
    Narula, Neha
    Fullagar, Nicholas
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (01) : 91 - 99
  • [10] Native Client: A Sandbox for Portable, Untrusted x86 Native Code
    Yee, Bennet
    Sehr, David
    Dardyk, Gregory
    Chen, J. Bradley
    Muth, Robert
    Ormandy, Tavis
    Okasaka, Shiki
    Narula, Neha
    Fullagar, Nicholas
    [J]. PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 79 - 93