skip to main content
10.1145/3342559.3365335acmotherconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Toward scaling hardware security module for emerging cloud services

Published:27 October 2019Publication History

ABSTRACT

The hardware security module (HSM) has been used as a root of trust for various key management services. At the same time, rapid innovation in emerging industries, such as container-based microservices, accelerates demands for scaling security services. However, current on-premises HSMs have limitations to afford such demands due to the restricted scalability and high price of deployment. This paper presents ScaleTrust, a framework for scaling security services by utilizing HSMs with SGX-based key management service (KMS) in a collaborative, yet secure manner. Based on a hierarchical model, we design a cryptographic workload distribution between HSMs and KMS enclaves to achieve both the elasticity of cloud software and the hardware-based security of HSM appliances. We demonstrate practical implications of ScaleTrust using two case studies that require secure cryptographic operations with low latency and high scalability.

References

  1. Asylo: An Open and Flexible Framework for Enclave Applications. https://asylo.dev.Google ScholarGoogle Scholar
  2. AWS CloudHSM. https://aws.amazon.com/cloudhsm.Google ScholarGoogle Scholar
  3. Egnyte Key Management. https://www.egnyte.com/encryption-key-management.html.Google ScholarGoogle Scholar
  4. Google Cloud HSM. https://cloud.google.com/hsm.Google ScholarGoogle Scholar
  5. IBM Cloud HSM. https://www.ibm.com/cloud/hardware-security-module.Google ScholarGoogle Scholar
  6. IBM Systems cryptographic HSMs. https://www.ibm.com/security/cryptocards/hsms.Google ScholarGoogle Scholar
  7. Intel® Software Guard Extensions SDK for Linux* OS. https://github.com/intel/linux-sgx.Google ScholarGoogle Scholar
  8. Official Docker v17.06 documentation. Manage swarm security with public key infrastructure [Accessed Aug. 20, 2019].Google ScholarGoogle Scholar
  9. Open Enclave SDK. https://openenclave.io/sdk.Google ScholarGoogle Scholar
  10. OpenDNSSEC SoftHSM. https://www.opendnssec.org/softhsm.Google ScholarGoogle Scholar
  11. SafeNet Hardware Security Modules. https://safenet.gemalto.com/data-encryption/hardware-security-modules-hsms.Google ScholarGoogle Scholar
  12. Thales eSecurity Key Management. https://www.thalesesecurity.com/products/key-management.Google ScholarGoogle Scholar
  13. WolfSSL Intel SGX. https://www.wolfssl.com/wolfssl-intel-sgx-fips-140--2.Google ScholarGoogle Scholar
  14. FIPSPUB 140--2. Security requirements for cryptographic modules, 2001.Google ScholarGoogle Scholar
  15. J.-B. Bédrune et al. Everybody be Cool, This is a Robbery! https://i.blackhat.com/USA-19/Thursday/us-19-Campana-Everybody-Be-Cool-This-Is-A-Robbery.pdf, 2019.Google ScholarGoogle Scholar
  16. J. G. Beekman et al. Challenges For Scaling Applications Across Enclaves. In Proc. SysTEX. ACM, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Bradley et al. JSON web token (JWT). https://tools.ietf.org/html/rfc7519, 2015.Google ScholarGoogle Scholar
  18. S. Chakrabarti et al. Intel SGX Enabled Key Manager Service with OpenStack Barbican. arXiv preprint arXiv:1712.07694, 2017.Google ScholarGoogle Scholar
  19. S. Chakrabarti et al. Scaling Intel® Software Guard Extensions Applications with Intel® SGX Card. In Proc. HASP. ACM, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. L. Chen. Microservices: architecting for continuous delivery and devops. In Proc. ICSA. IEEE, 2018.Google ScholarGoogle Scholar
  21. CloudFlare. The DNSSEC Root Signing Ceremony. https://www.cloudflare.com/dns/dnssec/root-signing-ceremony.Google ScholarGoogle Scholar
  22. EFTLAB. HSMs in a Payment Industry. https://www.eftlab.com/hsms-in-a-payment-industry.Google ScholarGoogle Scholar
  23. J. Haswell. SSD Architectures to Ensure Security and Performance. Flash Memory Summit, 2016.Google ScholarGoogle Scholar
  24. F. R. Konkel. The Pentagon isn't ready yet for classified information to be stored off-premise in the cloud. https://www.nextgov.com/emerging-tech/2015/02/dod-wants-physical-separation-classified-data-cloud-now/105753.Google ScholarGoogle Scholar
  25. D. Liu et al. Veriui: Attested Login for Mobile Devices. In Proc. HotMobile, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Luo et al. TZ-KMS: A Secure Key Management Service for Joint Cloud Computing with ARM TrustZone. In Proc. SOSE, 2018.Google ScholarGoogle Scholar
  27. F. McKeen et al. Innovative Instructions and Software Model for Isolated Execution. In Proc. HASP, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Stubbs. Turning Cryptography into a Service. https://www.cryptomathic.com/news-events/blog/turning-cryptography-into-a-service-part-1.Google ScholarGoogle Scholar
  29. Thales eSecurity. What is FIPS 140-2? https://www.thalesesecurity.com/faq/key-secrets-management/what-fips-140-2.Google ScholarGoogle Scholar
  30. J. Wilder. PCI Requirement 3.6.6 - Using Split Knowledge & Dual Control. https://kirkpatrickprice.com/video/pci-requirement-3-6-6-using-split-knowledge-dual-control/.Google ScholarGoogle Scholar
  31. E.Wolff. Microservices: flexible software architecture. Addison-Wesley Professional, 2016.Google ScholarGoogle Scholar
  32. T. Yarygina et al. Overcoming Security Challenges in Microservice Architectures. In Proc. SOSE. IEEE, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  33. J. Zhang et al. Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues. IEEE Access, 2018.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Toward scaling hardware security module for emerging cloud services

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      SysTEX '19: Proceedings of the 4th Workshop on System Software for Trusted Execution
      October 2019
      42 pages
      ISBN:9781450368889
      DOI:10.1145/3342559

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 27 October 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader