CRISP: Confidentiality, Rollback, and Integrity Storage Protection for Confidential Cloud-Native Computing
Research output: Contribution to conferences › Paper › Contributed › peer-review
Contributors
Abstract
Trusted execution environments (TEEs) protect the integrity and confidentiality of running code and its associated data. Nevertheless, TEEs' integrity protection does not extend to the state saved on disk. Furthermore, modern cloud-native applications heavily rely on orchestration (e.g., through systems such as Kubernetes) and, thus, have their services frequently restarted. During restarts, attackers can revert the state of confidential services to a previous version that may aid their malicious intent. This paper presents CRISP, a rollback protection mechanism that uses an existing runtime for Intel SGX and transparently prevents rollback. Our approach can constrain the attack window to a fixed and short period or give developers the tools to avoid the vulnerability window altogether. Finally, experiments show that applying CRISP in a critical stateful cloud-native application may incur a resource increase but only a minor performance penalty.
Details
Original language | English |
---|---|
Pages | 141-152 |
Number of pages | 12 |
Publication status | Published - 2024 |
Peer-reviewed | Yes |
Conference
Title | 2024 IEEE 17th International Conference on Cloud Computing |
---|---|
Abbreviated title | IEEE CLOUD 2024 |
Conference number | 17 |
Description | at the 2024 IEEE WORLD CONGRESS ON SERVICES |
Duration | 7 - 13 July 2024 |
Website | |
Location | Intercontinental Shenzhen Hotel |
City | Shenzhen |
Country | China |
External IDs
Scopus | 85203243744 |
---|---|
Mendeley | e59f95f3-35eb-3166-b463-1313ff315689 |
Keywords
ASJC Scopus subject areas
Keywords
- and Freshness), confidential computing, data CIF (Confidentiality, Integrity, Intel SGX, rollback-protection, stateful computing