Departing from "your data is safe with us" model where the cloud infrastructure is trusted, cloud tenants are shifting towards a model in which the cloud provider is not part of the trust domain. Both silicon and cloud vendors are trying to address this shift by introducing confidential computing - an umbrella term that provides mechanisms for protecting the data in-use through encryption below the hardware boundary of the CPU, e.g., Intel Software Guard Extensions (SGX), AMD secure encrypted virtualization (SEV), Intel trust domain extensions (TDX), etc. In this work, we design and implement a virtual trusted platform module (vTPM) that virtualizes the hardware root-of-trust without requiring to trust the cloud provider. To ensure the security of a vTPM in a provider-controlled environment, we leverage unique isolation properties of the SEV-SNP hardware and a novel approach to ephemeral TPM state management. Specifically, we develop a stateless ephemeral vTPM that supports remote attestation without persistent state. This allows us to pair each confidential VM with a private instance of a vTPM that is completely isolated from the provider-controlled environment and other VMs. We built our prototype entirely on open-source components - Qemu, Linux, and Keylime. Though our work is AMD-specific, a similar approach could be used to build remote attestation protocol on other trusted execution environments (TEE).
翻译:在“您的数据在我们这里是安全的”模型中,云计算租户正在向云提供商不参与信任领域的模型转移。硅和云供应商都试图通过引入保密计算来解决这种转变——保密计算是一个提供机制的总称,该机制通过在CPU的硬件边界以下进行加密来保护正在使用的数据,例如,英特尔软件看守扩展(SGX),AMD安全加密虚拟化(SEV),英特尔信任域扩展(TDX)等。在这项工作中,我们设计并实现了一种虚拟可信平台模块(vTPM),该模块在不需要信任云提供商的情况下虚拟化硬件信任根。为了确保在提供商控制的环境中vTPM的安全性,我们利用SEV-SNP硬件的独特隔离属性和一种新颖的瞬时TPM状态管理方法。具体而言,我们开发了一种无状态瞬时vTPM,支持远程证明而不需要持久状态。这使我们能够将每个保密虚拟机与完全与提供商控制的环境和其他虚拟机隔离的私有虚拟平台模块实例配对。我们的原型完全基于开源组件——Qemu,Linux和Keylime构建。尽管我们的工作是针对AMD可信执行环境的,但类似的方法可以用于构建其他可信执行环境上的远程证明协议。