Distributed systems and trusted execution environments: Trade-offs and challenges
Resumo
This extended abstract summarises my PhD thesis, which explores design strategies for distributed systems that leverage trusted execution environments (TEEs). We aim at achieving better security and privacy guarantees while maintaining or improving performance in comparison to existing equivalent approaches. To that end, we propose a few original systems that take advantage of TEEs. On top of prototypes built with Intel software guard extensions (SGX) and deployed on real hardware, we evaluate their limitations and discuss the outcomes of such an emergent technology.
Referências
Brenner, S., Wulf, C., Goltzsche, D., Weichbrodt, N., Lorenz, M., Fetzer, C., Pietzuch, P., and Kapitza, R. (2016). SecureKeeper: Confidential ZooKeeper using intel SGX. In Proc. of the 17th Int. Middleware Conf., NewYork, NY, USA.
Bulck, J. V., Minkin, M., Weisse, O., Genkin, D., Kasikci, B., Piessens, F., Silberstein, M., Wenisch, T. F.,Yarom, Y., and Strackx, R. (2018). Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In 27th USENIX Security Symp.
Carzaniga, A., Rosenblum, D. S., and Wolf, A. L. (2001). Design and evaluation of a wide-area event notification service. ACM TOCS, 19(3).
Choi, S., Ghinita, G., and Bertino, E. (2010). A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations. In 27st Int. Conf. on database and expert systems applic. (DEXA),Bilbao, Spain.
Delerablée, C. (2007). Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology — ASIACRYPT 2007.
Dingledine, R., Mathewson, N., and Syverson, P. F. (2004). Tor: The second-generation onion router. In Proc. of the 13th USENIX Security Symp., San Diego, USA.
Domingo-Ferrer, J., Solanas, A., and Castellà-Roca, J. (2009). h(k)-private information retrieval from privacy-uncooperative queryable databases. Online Inf. Review, 334).
Howe, D. C. and Nissenbaum, H. (2009). TrackMeNot: Resisting surveillance in web search. Lessons from the id, trail: Anonymity; priv, and id. in a networked society, 23.
Petit, A., Cerqueus, T., Mokhtar, S. B., Brunie, L., and Kosch, H. (2015). PEAS: Private, efficient and accurate web search. In 2015 IEEE Trustcom/BigDataSE/ISPA.
Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar-Ruiz, G., and Russinovich, M. (2015).VC3: Trustworthy data analytics in the cloud using SGX. In IEEE Symp. on Security and Privacy.
Tsai, C., Porter, D. E., and Vij, M. (2017). Graphene-SGX: A practical library OS for unmodified applications on SGX. In USENIX ATC, Santa Clara, CA.