首页> 外文会议>International workshop on security and trust management >Challenges of Using Trusted Computing for Collaborative Data Processing
【24h】

Challenges of Using Trusted Computing for Collaborative Data Processing

机译:使用可信计算进行协作数据处理的挑战

获取原文

摘要

In recent years many business processes have become more interconnected than ever before. Driven by the advance of the Internet of Things, companies rely on complex data processing chains that span over many collaborating corporations and across different countries. As a result of this development, automated data acquisition and collaborative data usage is now a foundation of many innovative and successful business models. However, despite having a clear interest in sharing valuable data with other stakeholders, data owners simultaneously need to protect their assets against illegitimate use. In order to accommodate this requirement, existing data sharing solutions contain usage control systems capable of enforcing policies on data even after they have been shared. The integrity of these policy enforcement components is often monitored by a trusted platform module (TPM) on the data receiver's side. In this work we evaluate the adequacy of TPM-based remote attestation for protecting shared data on foreign systems. In order to do so we develop an attacker model that includes privileged system users and expose attack vectors on TPM-protected data sharing applications. We show that TPMs do not provide sufficient protection against malicious administrators from competing stakeholders. Finally, we describe the advantages of using Intel's Software Guard Extensions (SGX) to protect shared data in hostile environments and propose an enhanced system architecture that includes both SGX enclaves as well as a classical TPM.
机译:近年来,许多业务流程之间的联系比以往任何时候都更加紧密。在物联网的推动下,公司依赖于跨越许多合作公司以及不同国家/地区的复杂数据处理链。由于这一发展,自动化数据采集和协作数据使用现在已成为许多创新和成功的业务模型的基础。但是,尽管对与其他利益相关者共享有价值的数据有明显的兴趣,但是数据所有者同时需要保护其资产免遭非法使用。为了适应这一需求,现有的数据共享解决方案包含使用控制系统,即使在共享数据后,这些使用控制系统也可以对数据实施策略。这些策略执行组件的完整性通常由数据接收者侧的受信任平台模块(TPM)监视。在这项工作中,我们评估了基于TPM的远程证明在保护外部系统上的共享数据方面的适当性。为此,我们开发了一个包含特权系统用户的攻击者模型,并在受TPM保护的数据共享应用程序上公开了攻击媒介。我们表明,TPM不能提供足够的保护,以防止来自竞争利益相关者的恶意管理员。最后,我们描述了使用Intel的Software Guard Extensions(SGX)在敌对环境中保护共享数据的优势,并提出了一种增强的系统体系结构,其中包括SGX飞地和经典TPM。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号