Distributed systems and trusted execution environments: Trade-offs and challenges

Resumo


This extended abstract summarises my PhD thesis, which explores design strategies for distributed systems that leverage trusted execution environments (TEEs). We aim at achieving better security and privacy guarantees while maintaining or improving performance in comparison to existing equivalent approaches. To that end, we propose a few original systems that take advantage of TEEs. On top of prototypes built with Intel software guard extensions (SGX) and deployed on real hardware, we evaluate their limitations and discuss the outcomes of such an emergent technology.

Palavras-chave: security, privacy, TEE, SGX, distributed systems, communication, processing, cryptographic protocols, web search

Referências

Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe,D., Stillwell, M. L., Goltzsche, D., Eyers, D., Kapitza, R., Pietzuch, P., and Fetzer, C. (2016). SCONE : Secure linux containers with intel SGX. In /2th USENIX Symp. on OSes Design and Implementation (OSDI).

Brenner, S., Wulf, C., Goltzsche, D., Weichbrodt, N., Lorenz, M., Fetzer, C., Pietzuch, P., and Kapitza, R. (2016). SecureKeeper: Confidential ZooKeeper using intel SGX. In Proc. of the 17th Int. Middleware Conf., NewYork, NY, USA.

Bulck, J. V., Minkin, M., Weisse, O., Genkin, D., Kasikci, B., Piessens, F., Silberstein, M., Wenisch, T. F.,Yarom, Y., and Strackx, R. (2018). Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution. In 27th USENIX Security Symp.

Carzaniga, A., Rosenblum, D. S., and Wolf, A. L. (2001). Design and evaluation of a wide-area event notification service. ACM TOCS, 19(3).

Choi, S., Ghinita, G., and Bertino, E. (2010). A privacy-enhancing content-based publish/subscribe system using scalar product preserving transformations. In 27st Int. Conf. on database and expert systems applic. (DEXA),Bilbao, Spain.

Delerablée, C. (2007). Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology — ASIACRYPT 2007.

Dingledine, R., Mathewson, N., and Syverson, P. F. (2004). Tor: The second-generation onion router. In Proc. of the 13th USENIX Security Symp., San Diego, USA.

Domingo-Ferrer, J., Solanas, A., and Castellà-Roca, J. (2009). h(k)-private information retrieval from privacy-uncooperative queryable databases. Online Inf. Review, 334).

Howe, D. C. and Nissenbaum, H. (2009). TrackMeNot: Resisting surveillance in web search. Lessons from the id, trail: Anonymity; priv, and id. in a networked society, 23.

Petit, A., Cerqueus, T., Mokhtar, S. B., Brunie, L., and Kosch, H. (2015). PEAS: Private, efficient and accurate web search. In 2015 IEEE Trustcom/BigDataSE/ISPA.

Schuster, F., Costa, M., Fournet, C., Gkantsidis, C., Peinado, M., Mainar-Ruiz, G., and Russinovich, M. (2015).VC3: Trustworthy data analytics in the cloud using SGX. In IEEE Symp. on Security and Privacy.

Tsai, C., Porter, D. E., and Vij, M. (2017). Graphene-SGX: A practical library OS for unmodified applications on SGX. In USENIX ATC, Santa Clara, CA.
Publicado
07/12/2020
Como Citar

Selecione um Formato
PIRES, Rafael Pereira; FELBER, Pascal; PASIN, Marcelo. Distributed systems and trusted execution environments: Trade-offs and challenges. In: CONCURSO DE TESES E DISSERTAÇÕES - SIMPÓSIO BRASILEIRO DE REDES DE COMPUTADORES E SISTEMAS DISTRIBUÍDOS (SBRC), 38. , 2020, Rio de Janeiro. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2020 . p. 137-144. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc_estendido.2020.12412.