Time to Rethink: Trust Brokerage Using Trusted Execution Environments

被引:10
|
作者
Koeberl, Patrick [1 ]
Phegade, Vinay [2 ]
Rajan, Anand [2 ]
Schneider, Thomas [3 ]
Schulz, Steffen [1 ]
Zhdanova, Maria [4 ]
机构
[1] Intel Labs, Darmstadt, Germany
[2] Intel Labs, Portland, OR USA
[3] Tech Univ Darmstadt, Darmstadt, Germany
[4] Fraunhofer SIT, Darmstadt, Germany
关键词
PRIVACY;
D O I
10.1007/978-3-319-22846-4_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mining and analysis of digital data has the potential to provide improved quality of life and offer even life-saving insights. However, loss of privacy or secret information would be detrimental to these goals and inhibit widespread application. Traditional data protection measures tend to result in the formation of data silos, severely limiting the scope and yield of "Big Data". Technology such as privacy-preserving multiparty computation (MPC) and data de-identification can break these silos enabling privacy-preserving computation. However, currently available de-identification schemes tend to suffer from privacy/utility tradeoffs, and MPC has found deployment only in niche applications. As the assurance and availability of hardware-based Trusted Execution Environments (TEEs) is increasing, we propose an alternative direction of using TEEs as "neutral" environments for efficient yet secure multi-party computation. To this end, we survey the current state of the art, propose a generic initial solution architecture and identify remaining challenges.
引用
收藏
页码:181 / 190
页数:10
相关论文
共 50 条
  • [21] Attestation Mechanisms for Trusted Execution Environments Demystified
    James, Menetrey
    Gottel, Christian
    Khurshid, Anum
    Pasin, Marcelo
    Felber, Pascal
    Schiavoni, Valerio
    Raza, Shahid
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS (DAIS 2022), 2022, 13272 : 95 - 113
  • [22] Quantitative and Qualitative Investigations into Trusted Execution Environments
    Karl, Ryan
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT II, 2021, 399 : 372 - 383
  • [23] HasTEE: Programming Trusted Execution Environments with Haskell
    Sarkar, Abhiroop
    Krook, Robert
    Russo, Alejandro
    Claessen, Koen
    PROCEEDINGS OF THE 16TH ACM SIGPLAN INTERNATIONAL SYMPOSIUM ON HASKELL, HASKELL 2023, 2023, : 72 - 88
  • [24] Key Attestation from Trusted Execution Environments
    Kostiainen, Kari
    Dmitrienko, Alexandra
    Ekberg, Jan-Erik
    Sadeghi, Ahmad-Reza
    Asokan, N.
    TRUST AND TRUSTWORTHY COMPUTING, PROCEEDINGS, 2010, 6101 : 30 - +
  • [25] Trusted Execution Environments: Applications and Organizational Challenges
    Geppert, Tim
    Deml, Stefan
    Sturzenegger, David
    Ebert, Nico
    FRONTIERS IN COMPUTER SCIENCE, 2022, 4
  • [26] Trusted Execution Environments: Properties, Applications, and Challenges
    Jauernig, Patrick
    Sadeghi, Ahmad-Reza
    Stapf, Emmanuel
    IEEE SECURITY & PRIVACY, 2020, 18 (02) : 56 - 60
  • [27] On (the Lack of) Code Confidentiality in Trusted Execution Environments
    Puddu, Ivan
    Schneider, Moritz
    Lain, Daniele
    Boschetto, Stefano
    Capkun, Srdjan
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 4125 - 4142
  • [28] MATEE: Multimodal Attestation for Trusted Execution Environments
    Galanou, Anna
    Gregor, Franz
    Kapitza, Ruediger
    Fetzer, Christof
    PROCEEDINGS OF THE TWENTY-THIRD ACM/IFIP INTERNATIONAL MIDDLEWARE CONFERENCE, MIDDLEWARE 2022, 2022, : 121 - 134
  • [29] Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain
    Cheng, Jieren
    Li, Jun
    Xiong, Naixue
    Chen, Meizhu
    Guo, Hao
    Yao, Xinzhi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 65 (03): : 2247 - 2262
  • [30] Enhancing Security and Privacy of Tor's Ecosystem by using Trusted Execution Environments
    Kim, Seongmin
    Han, Juhyeng
    Ha, Jaehyung
    Kim, Taesoo
    Han, Dongsu
    PROCEEDINGS OF NSDI '17: 14TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2017, : 145 - 161