Affiliation:
1. State Key Laboratory of Computer Science Institute of Software Beijing China
2. Trusted Computing and Information Assurance Laboratory Institute of Software Beijing China
3. School of Computer Science and Technology University of Chinese Academy of Sciences Beijing China
Abstract
AbstractAs the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent. Confidential computing emerges as a crucial security technology to solve security and privacy problem, and it is also a hot subject of in contemporary security technologies. Leveraging collaborative security in both hardware and software, it builds a trusted execution environment to ensure confidentiality and integrity protection for data in use. This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Furthermore, it deeply analyses the common technical features of confidential computing, and proposes a trusted confidential computing architecture based on collaborative hardware and software trust. Then, it elaborates on the research status and issues of confidential computing from four aspects: hardware security, architecture and key technologies, applications, and standards and evaluation. Finally, this paper provides a synthesis and outlook for the future development of confidential computing. In summary, confidential computing is currently in a rapidly developing stage and will play an important role in cyber security in the future.
Funder
National Key Research and Development Program of China
Publisher
Institution of Engineering and Technology (IET)
Reference133 articles.
1. Alliance P.C.:Privacy computing white paper(2022).http://221.179.172.81/images/20221229/48421672279200206.pdf
2. Alliance P.C.:Research report on privacy computing applications(2023).https://dsj.guizhou.gov.cn/xwzx/gnyw/202308/t20230819_81912599.html
3. Consortium C.C.:A technical analysis of confidential computing(2021).https://confidentialcomputing.io/wp‐content/uploads/sites/10/2023/03/CCC‐A‐Technical‐Analysis‐of‐Confidential‐Computing‐v1.3_unlocked.pdf
4. Architectural support for copy and tamper resistant software
5. Suh G.E. Clarke D. Gassend B. Van Dijk M. Devadas S.:AEGIS: Architecture for tamper‐evident and tamper‐resistant processing. In:ACM SIGSAC pp.357–368(2003)