Architectural Protection of Trusted System Services for SGX Enclaves in Cloud Computing

被引:3
|
作者
Liang, Hongliang [1 ]
Li, Mingyu [1 ]
Chen, Yixiu [1 ]
Yang, Tianqi [1 ]
Xie, Zhuosi [1 ]
Jiang, Lin [1 ]
机构
[1] Beijing Univ Posts & Telecommun, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
Trusted system services; Intel SGX; SMM; ATTACKS;
D O I
10.1109/TCC.2019.2892449
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data security and privacy are of great concern for users of cloud computing. In order to provide such guarantees in public clouds, hardware manufacturers have designed trusted execution environments such as Intel's Software Guard eXtensions (SGX). Intel SGX supports privacy-preserving, tamper-proof containments called enclaves. Regrettably, an SGX enclave has to rely on the untrusted operating system or hypervisor for underlying services, which contradicts the threat model of Intel SGX. Whereas much of the previous work concentrates on protecting trusted applications by means of modifying a hypervisor, we tackle the problem by reusing existing drivers and leveraging processor-enforced protection. We propose a novel approach, named SMK, to provide trusted system services for SGX enclaves. SMK leverages existing Intel architecture features, i.e., System Management Mode (SMM) and Uniform Extensible Firmware Interface (UEFI). Specifically, we retrofit UEFI firmware and design an isolated micro-kernel inside SMM to securely provision critical system services for enclaves. To highlight the effectiveness and extensibility of SMK, we implement two system services: trusted clock and trusted network. Furthermore, we harden two real-world security-sensitive applications, OpenSSL and OpenVPN, with SMK's system services. Our evaluation indicates that SMK can supply trusted system services for enclaves with modest runtime overheads.
引用
收藏
页码:910 / 922
页数:13
相关论文
共 50 条
  • [41] Trusted Execution Environment for Data Protection in Cloud
    Srinivas, Podili V. S.
    Pravallika, Ch
    Raju, K. Srujan
    [J]. INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 3, INDIA 2016, 2016, 435 : 657 - 665
  • [42] Public Auditing for Trusted Cloud Storage Services
    Tian, Hui
    Chen, Yuxiang
    Jiang, Hong
    Huang, Yongfeng
    Nan, Fulin
    Chen, Yonghong
    [J]. IEEE SECURITY & PRIVACY, 2019, 17 (01) : 10 - 22
  • [43] PROTECTION FOR PUBLIC + ARCHITECTURAL SERVICES
    PALMER, OE
    [J]. ARCHITECTS JOURNAL, 1977, 165 (03): : 138 - 138
  • [44] Cloud Computing: Architectural and Policy Implications
    Christopher S. Yoo
    [J]. Review of Industrial Organization, 2011, 38 : 405 - 421
  • [45] Cloud Computing: Architectural and Policy Implications
    Yoo, Christopher S.
    [J]. REVIEW OF INDUSTRIAL ORGANIZATION, 2011, 38 (04) : 405 - 421
  • [46] Advances on cloud services and cloud computing
    Barolli, Leonard
    Chen, Xiaofeng
    Xhafa, Fatos
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 1985 - 1987
  • [47] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    [J]. INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [48] Cloud Computing: A Platform of Services for Services
    Senica, Nuno
    Teixeira, Claudio
    Pinto, Joacwim Sousa
    [J]. ENTERPRISE INFORMATION SYSTEMS, PT 2, 2011, 220 : 91 - 100
  • [49] Architectural Designs from Mobile Cloud Computing to Ubiquitous Cloud Computing - Survey
    Lomotey, Richard K.
    Deters, Ralph
    [J]. 2014 IEEE WORLD CONGRESS ON SERVICES (SERVICES), 2014, : 418 - 425
  • [50] Trusted Model for Virtual Machine Security in Cloud Computing
    Narayana, K. Sathya
    Pasupuleti, Syam Kumar
    [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 655 - 665