论文标题
基于容器的机密计算的值得信赖的容器扩展
Trusted Container Extensions for Container-based Confidential Computing
论文作者
论文摘要
云计算已成为当今计算景观的角石。外包基础架构的越来越多的客户受益于云计算所带来的可管理性,可扩展性和成本。这些好处会因微服务的趋势而放大。客户没有租用和维护完整的VM,而是越来越利用容器技术,这些技术具有更轻巧的资源足迹,同时还消除了模拟完整系统及其设备的需求。 但是,隐私涉及阻碍许多客户转向云和利用其利益的障碍。此外,监管要求可以防止许多行业(例如医疗保健或金融)的云计算适应。如果主机系统不完全信任,例如,当云基础架构被恶意的第三方参与者损害时,标准软件隔离机制已被证明是不够的。因此,机密计算在云计算字段中的相关性增加。 我们提出了可信赖的容器扩展名(TCX),这是一种新颖的容器安全体系结构,将标准容器的可管理性和敏捷性与强大的硬件可信赖的执行环境(TEES)的强大保护保证,以实现容器工作负载的机密计算。与现有方法相比,TCX在保护容器工作负载及其处理的数据时具有显着的性能优势。我们的实施基于AMD安全的加密虚拟化(SEV),可确保部署过程中数据和服务的完整性和机密性,并允许在受保护的容器以及外部实体之间进行安全互动。我们的评估表明,我们的实施导致标准Spec2017基准套件的低性能开销为5.77%。
Cloud computing has emerged as a corner stone of today's computing landscape. More and more customers who outsource their infrastructure benefit from the manageability, scalability and cost saving that come with cloud computing. Those benefits get amplified by the trend towards microservices. Instead of renting and maintaining full VMs, customers increasingly leverage container technologies, which come with a much more lightweight resource footprint while also removing the need to emulate complete systems and their devices. However, privacy concerns hamper many customers from moving to the cloud and leveraging its benefits. Furthermore, regulatory requirements prevent the adaption of cloud computing in many industries, such as health care or finance. Standard software isolation mechanisms have been proven to be insufficient if the host system is not fully trusted, e.g., when the cloud infrastructure gets compromised by malicious third-party actors. Consequently, confidential computing is gaining increasing relevance in the cloud computing field. We present Trusted Container Extensions (TCX), a novel container security architecture, which combines the manageability and agility of standard containers with the strong protection guarantees of hardware-enforced Trusted Execution Environments (TEEs) to enable confidential computing for container workloads. TCX provides significant performance advantages compared to existing approaches while protecting container workloads and the data processed by them. Our implementation, based on AMD Secure Encrypted Virtualization (SEV), ensures integrity and confidentiality of data and services during deployment, and allows secure interaction between protected containers as well as to external entities. Our evaluation shows that our implementation induces a low performance overhead of 5.77% on the standard SPEC2017 benchmark suite.