Abstract
I propose to develop a quantitative and qualitative framework to integrate a Trusted Execution Environment (TEE) into the pipeline of secure computation by combining it with other cryptographic primitives. Such a hybrid framework will utilize mathematical and statistical modeling techniques to decide how to combine TEE and cryptographic primitives and evaluate the potential for performance improvement by moving secure computation processes into or out of a TEE. Ideally, I will be able to determine when to combine TEEs with pure-cryptography techniques to improve performance for a task, instead of simply using either method alone and only achieving suboptimal performance. The final goal is to design and develop an actionable decision-making framework, and utilize it to optimize the secure computation process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bradley, T.: Intel takes confidential computing to another level with ‘ice lake’ security capabilities. Forbes (2020)
Chatterjee, S., Hadi, A.S.: Regression Analysis by Example. John Wiley & Sons, Hoboken (2015)
Cheon, J.H., Kim, A., Kim, M., Song, Y.S.: Floating-point homomorphic encryption. IACR Cryptol. ePrint Arch. 2016, 421 (2016)
Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptol. ePrint Arch. 2016, 86 (2016)
Draper, N.R., Smith, H.: Applied Regression Analysis, vol. 326. John Wiley & Sons, Hoboken (1998)
Götzfried, J., Eckert, M., Schinzel, S., Müller, T.: Cache attacks on intel SGX. In: Proceedings of the 10th European Workshop on Systems Security, pp. 1–6 (2017)
Han, S., Zhao, S., Li, Q., Ju, C.H., Zhou, W.: PPM-HDA: privacy-preserving and multifunctional health data aggregation with fault tolerance. TIFS 11(9), 1940–1955 (2015)
Jung, T., Han, J., Li, X.Y.: PDA: semantically secure time-series data analytics with dynamic user groups. TDSC 15(2), 260–274 (2018)
Liu, D., Yan, Z., Ding, W., Atiquzzaman, M.: A survey on secure data analytics in edge computing. IEEE Internet Things J. 6(3), 4946–4967 (2019)
Mofrad, S., Zhang, F., Lu, S., Shi, W.: A comparison study of intel SGX and AMD memory encryption technology. In: ACM HASP, pp. 1–8 (2018)
Shi, E., Chan, H., Rieffel, E., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS. Internet Society (2011)
Tan, B.H.M., et al.: Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields. In: IEEE TDSC (2020)
Tramer, F., Boneh, D.: Slalom: Fast, verifiable and private execution of neural networks in trusted hardware. In: ICLR (2018)
Valovich, F., Aldà , F.: Computational differential privacy from lattice-based cryptography. In: Kaczorowski, J., Pieprzyk, J., Pomykała, J. (eds.) NuTMiC 2017. LNCS, vol. 10737, pp. 121–141. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76620-1_8
Weichbrodt, N., Kurmus, A., Pietzuch, P., Kapitza, R.: AsyncShock: exploiting synchronisation bugs in intel SGX enclaves. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 440–457. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45744-4_22
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Karl, R. (2021). Quantitative and Qualitative Investigations into Trusted Execution Environments. In: Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H., Yung, M. (eds) Security and Privacy in Communication Networks. SecureComm 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 399. Springer, Cham. https://doi.org/10.1007/978-3-030-90022-9_19
Download citation
DOI: https://doi.org/10.1007/978-3-030-90022-9_19
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-90021-2
Online ISBN: 978-3-030-90022-9
eBook Packages: Computer ScienceComputer Science (R0)