whitepapervault.com
HardwareMedical

Whitepapervault Com

Whitepapervault Com

confidentialcomputing.io A Technical Analysis of Confidential Computing A Publication of The Confidential Computing Consortium October 2021, v1.2 confidentialcomputing.io Changelog Table Version Release Date Change

  • 1.0 October 23, 2020 First Release.
  • 1.1 January 12, 2021
  • Updated title, link to Outreach white paper, and wording / grammat ical corrections.

  • 1.2 September 28, 2021 Errata
  • Contents

  • 1 Introduction 3
  • 2 Confidential Computing 4
  • 2.1 Definition 4
  • 2.2 Why is Hardware Necessary for Confidential Computing 4
  • 3 Trusted Execution Environments (TEEs) 5
  • 3.1 Properties 5
  • 4 Related Technologies 7
  • 4.1 Security Comparisons 8
  • 4.2 Scalability Comparisons 8
  • 5 Threat Model 9
  • 5.1 Goal 9
  • 5.2 Threat Vectors 10
  • 5.2.1 In-Scope 10
  • 5.2.2 Out-of-Scope 11
  • 5.3 Side-Channels 11
  • 5.3.1 Background 11
  • 5.3.2 Example 11
  • 5.3.3 Mitigation 12
  • 6 Attestation 13
  • 6.1 Hardware-Based Attestation 13
  • 6.2 Anonymity 14
  • 6.3 TCB Recovery 14
  • 7 Conclusion 15
  • About the Confidential Computing Consortium 16 References 17 Confidential Computing Consortium 4Confidential Computing Deep Dive v1.2

  • 1 Introduction
  • In classical computing, data exists in three states: in transit, at rest, and in use. Data traversing the network is “in transit,” data in storage is “at rest,” and data being processed is “in use.” In a world where we are constantly storing, consuming, and sharing sensitive data – from credit card data to medical records, from firewall configurations to our geolocation data – protecting sensitive data in all of its states is more critical than ever. Cryptography is now commonly deployed to provide both data confidentiality (stopping unauthorized viewing) and data integrity (preventing or detecting unauthorized changes). While techniques to protect data in transit and at rest are now commonly deployed, the third state – protecting data in use – is the new frontier. A Confidential Computing Consortium whitepaper [1] provides an overview of how Confidential Computing addresses this problem, along with use cases and motivation. This paper provides more details for a technical audience.

    Related posts

    Microsoft White Paper Book Cdr

    Cio Whitepaper Artificial Intelligence

    Leave a Comment