9
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      ISA-Based Trusted Network Functions And Server Applications In The Untrusted Cloud

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Nowadays, enterprises widely deploy Network Functions (NFs) and server applications in the cloud. However, processing of sensitive data and trusted execution cannot be securely deployed in the untrusted cloud. Cloud providers themselves could accidentally leak private information (e.g., due to misconfigurations) or rogue users could exploit vulnerabilities of the providers' systems to compromise execution integrity, posing a threat to the confidentiality of internal enterprise and customer data. In this paper, we identify (i) a number of NF and server application use-cases that trusted execution can be applied to, (ii) the assets and impact of compromising the private data and execution integrity of each use-case, and (iii) we leverage Intel's Software Guard Extensions (SGX) architecture to design Trusted Execution Environments (TEEs) for cloud-based NFs and server applications. We combine SGX with the Data Plane Development KIT (DPDK) to prototype and evaluate our TEEs for a number of application scenarios (Layer 2 frame and Layer 3 packet processing for plain and encrypted traffic, traffic load-balancing and back-end server processing). Our results indicate that NFs involving plain traffic can achieve almost native performance (e.g., ~22 Million Packets Per Second for Layer 3 forwarding for 64-byte frames), while NFs involving encrypted traffic and server processing can still achieve competitive performance (e.g., ~12 Million Packets Per Second for server processing for 64-byte frames).

          Related collections

          Most cited references20

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Network traffic characteristics of data centers in the wild

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            VC3: Trustworthy Data Analytics in the Cloud Using SGX

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Shielding Applications from an Untrusted Cloud with Haven

                Bookmark

                Author and article information

                Journal
                20 February 2018
                Article
                1802.06970
                2d9c39b2-4506-4ac6-b709-133cb00c29e9

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.NI cs.CR

                Comments

                Comment on this article