Digital services have been offered through remote systems for decades. The questions of how these systems can be built in a trustworthy manner and how their security properties can be understood are given fresh impetus by recent hardware developments, allowing a fuller, more general, exploration of the possibilities than has previously been seen in the literature. Drawing on and consolidating the disparate strains of research, technologies and methods employed throughout the adaptation of confidential computing, we present a novel, dedicated Confidential Remote Computing (CRC) model. CRC proposes a compact solution for next-generation applications to be built on strong hardware-based security primitives, control of secure software products' trusted computing base, and a way to make correct use of proofs and evidence reports generated by the attestation mechanisms. The CRC model illustrates the trade-offs between decentralisation, task size and transparency overhead. We conclude the paper with six lessons learned from our approach, and suggest two future research directions.
翻译:数字服务通过远程系统提供已经有几十年的历史了。如何以可信赖的方式构建这些系统以及如何理解它们的安全性质是最近硬件发展带来的新动力,允许比以前文献中看到的更充分、更通用地探索可能性。本文结合和巩固了适应机密计算的分散研究、技术和方法,提出了一种新颖的、专门的机密远程计算(CRC)模型。CRC提出了一种紧凑的解决方案,使下一代应用建立在强大的基于硬件的安全基元、控制安全软件产品的可信计算基础上,以及一种方法,通过证实机制生成的证明和证据报告来正确使用。CRC模型说明了分散化、任务大小和透明度开销之间的权衡。我们在论文中总结了我们的方法学到的六个教训,并提出了两个未来的研究方向。