A Practical Intel SGX Setting for Linux Containers in the Cloud

被引:16
|
作者
Tian, Dave [1 ]
Choi, Joseph, I [1 ]
Hernandez, Grant [1 ]
Traynor, Patrick [1 ]
Butler, Kevin R. B. [1 ]
机构
[1] Univ Florida, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
Cloud; Containers; Security; SGX;
D O I
10.1145/3292006.3300030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With close to native performance, Linux containers are becoming the de facto platform for cloud computing. While various solutions have been proposed to secure applications and containers in the cloud environment by leveraging Intel SGX, most cloud operators do not yet offer SGX as a service. This is likely due to a number of security, scalability, and usability concerns coming from both cloud providers and users. Cloud operators worry about the security guarantees of unofficial SDKs, limited support for remote attestation within containers, limited physical memory for the Enclave Page Cache (EPC) making it difficult to support hundreds of enclaves, and potential DoS attacks against EPC by malicious users. Meanwhile, end users need to worry about careful program partitioning to reduce the TCB and adapting legacy applications to use SGX. We note that most of these concerns are the result of an incomplete infrastructure, from the OS to the application layer. We address these concerns with lxcsgx, which allows SGX applications to run inside containers while also: enabling SGX remote attestation for containerized applications, enforcing EPC memory usage control on a per-container basis, providing a general software TPM using SGX to augment legacy applications, and supporting partitioning with a GCC plugin. We then retrofit Nginx/OpenSSL and Memcached using the software TPM and SGX partitioning to defend against known and potential attacks. Thanks to the small EPC footprint of each enclave, we are able to run up to 100 containerized Memcached instances without EPC swapping. Our evaluation shows the overhead introduced by lxcsgx is less than 6.9% for simple SGX applications, 9.5% for Nginx/OpenSSL, and 20.9% for containerized Memcached.
引用
收藏
页码:255 / 266
页数:12
相关论文
共 50 条
  • [41] SGXGauge: A Comprehensive Benchmark Suite for Intel SGX
    Kumar, Sandeep
    Panda, Abhisek
    Sarangi, Smruti R.
    [J]. 2022 IEEE INTERNATIONAL SYMPOSIUM ON PERFORMANCE ANALYSIS OF SYSTEMS AND SOFTWARE (ISPASS 2022), 2022, : 135 - 137
  • [42] UniGuard: Protecting Unikernels using Intel SGX
    Sfyrakis, Ioannis
    Gross, Thomas
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E 2018), 2018, : 99 - 105
  • [43] IRON: Functional Encryption using Intel SGX
    Fisch, Ben
    Vinayagamurthy, Dhinakaran
    Boneh, Dan
    Gorbunov, Sergey
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 765 - 782
  • [44] Toward Migration of SGX-Enabled Containers
    Liang, Hongliang
    Zhang, Qiong
    Li, Mingyu
    Li, Jianqiang
    [J]. 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 713 - 718
  • [45] SGX-FS: Hardening a File System in User-Space with Intel SGX
    Burihabwa, Dorian
    Felber, Pascal
    Mercier, Hugues
    Schiavoni, Valerio
    [J]. 2018 16TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2018), 2018, : 67 - 72
  • [46] No ForkingWay: Detecting Cloning Attacks on Intel SGX Applications
    Briongos, Samira
    Karame, Ghassan
    Soriente, Claudio
    Wilde, Annika
    [J]. 39TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2023, 2023, : 744 - 758
  • [47] ZeroTrace: Oblivious Memory Primitives from Intel SGX
    Sasy, Sajin
    Gorbunov, Sergey
    Fletcher, Christopher W.
    [J]. 25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018), 2018,
  • [48] Dynamic replication factor model for Linux containers-based cloud systems
    Heithem Abbes
    Thouraya Louati
    Christophe Cérin
    [J]. The Journal of Supercomputing, 2020, 76 : 7219 - 7241
  • [49] CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX
    Wang, Yongzhi
    Liu, Lingtong
    Su, Cuicui
    Ma, Jiawen
    Wang, Lei
    Yang, Yibo
    Shen, Yulong
    Li, Guangxia
    Zhang, Tao
    Dong, Xuewen
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 303 - 308
  • [50] S-ZAC: Hardening Access Control of Service Mesh Using Intel SGX for Zero Trust in Cloud
    Han, Changhee
    Kim, Taehun
    Lee, Woomin
    Shin, Youngjoo
    [J]. ELECTRONICS, 2024, 13 (16)