论文标题
分布式系统和可信赖的执行环境:权衡和挑战
Distributed systems and trusted execution environments: Trade-offs and challenges
论文作者
论文摘要
计算机系统中的安全性和隐私问题随着连接设备的无处不在而变得重要。 TEE根据内置硬件的加密结构提供安全保证。尤其是英特尔软件守卫扩展(SGX),也实现了强大的机制,即使完全控制系统软件的特权用户,也可以屏蔽敏感数据。在这项工作中,我们从本质上探讨了通过使用英特尔SGX作为基石设计安全分布式系统的一些挑战。我们通过设计和实验评估几个基本系统,从通信和处理中间件到点对点隐私保护解决方案,这样做。我们从自然适合云部署方案的支持系统,即基于内容的路由,批处理和流处理框架。我们实施原型并使用它们来分析SGX固有的明显内存使用问题。接下来,我们旨在保护非常敏感的数据:加密密钥。通过利用TEE,我们为组数据共享设计协议,其计算复杂性低于旧方法。作为奖励,我们的建议允许在元数据量和加密操作的处理时间上节省大量,所有这些都具有同等的安全保证。最后,我们建议使用网络搜索引擎(例如网络搜索引擎)的既定服务进行隐私的系统。我们的评估表明,与现有解决方案相比,我们提出了最强大的系统,以可扩展的方式与用户重新识别率和结果准确性相比。总体而言,本文提出了利用T恤来用于分布式系统体系结构的新机制。我们通过Intel SGX的经验方法展示了应用于分布式通信和处理,加密协议和私人Web搜索的不同设计的权衡。
Security and privacy concerns in computer systems have grown in importance with the ubiquity of connected devices. TEEs provide security guarantees based on cryptographic constructs built in hardware. Intel software guard extensions (SGX), in particular, implements powerful mechanisms that can shield sensitive data even from privileged users with full control of system software. In this work, we essentially explore some of the challenges of designing secure distributed systems by using Intel SGX as cornerstone. We do so by designing and experimentally evaluating several elementary systems ranging from communication and processing middleware to a peer-to-peer privacy-preserving solution. We start with support systems that naturally fit cloud deployment scenarios, namely content-based routing, batching and stream processing frameworks. We implement prototypes and use them to analyse the manifested memory usage issues intrinsic to SGX. Next, we aim at protecting very sensitive data: cryptographic keys. By leveraging TEEs, we design protocols for group data sharing that have lower computational complexity than legacy methods. As a bonus, our proposals allow large savings on metadata volume and processing time of cryptographic operations, all with equivalent security guarantees. Finally, we propose privacy-preserving systems against established services like web-search engines. Our evaluation shows that we propose the most robust system in comparison to existing solutions with regard to user re-identification rates and results accuracy in a scalable way. Overall, this thesis proposes new mechanisms that take advantage of TEEs for distributed system architectures. We show through an empirical approach on top of Intel SGX what are the trade-offs of distinct designs applied to distributed communication and processing, cryptographic protocols and private web search.