[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2988336.2988350acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

SecureKeeper: Confidential ZooKeeper using Intel SGX

Published: 28 November 2016 Publication History

Abstract

Cloud computing, while ubiquitous, still suffers from trust issues, especially for applications managing sensitive data. Third-party coordination services such as ZooKeeper and Consul are fundamental building blocks for cloud applications, but are exposed to potentially sensitive application data. Recently, hardware trust mechanisms such as Intel's Software Guard Extensions (SGX) offer trusted execution environments to shield application data from untrusted software, including the privileged Operating System (OS) and hypervisors. Such hardware support suggests new options for securing third-party coordination services.
We describe SecureKeeper, an enhanced version of the ZooKeeper coordination service that uses SGX to preserve the confidentiality and basic integrity of ZooKeeper-managed data. SecureKeeper uses multiple small enclaves to ensure that (i) user-provided data in ZooKeeper is always kept encrypted while not residing inside an enclave, and (ii) essential processing steps that demand plaintext access can still be performed securely. SecureKeeper limits the required changes to the ZooKeeper code base and relies on Java's native code support for accessing enclaves. With an overhead of 11%, the performance of SecureKeeper with SGX is comparable to ZooKeeper with secure communication, while providing much stronger security guarantees with a minimal trusted code base of a few thousand lines of code.

References

[1]
IDC, Worldwide Cloud IT Infrastructure Market Growth Expected to Accelerate {...} http://www.idc.com/getdoc.jsp?containerId=prUS25576415, 2015.
[2]
K. R. Jayaram, D. Safford, U. Sharma, V. Naik, D. Pendarakis, and S. Tao, Trustworthy Geographically Fenced Hybrid Clouds, Middleware, 2014.
[3]
S. Pearson and A. Benameur, Privacy, Security and Trust Issues Arising from Cloud Computing, CloudCom, 2010.
[4]
F. McKeen, I. Alexandrovich, A. Berenzon, C. V. Rozas, H. Shafi, V. Shanbhogue, and U. R. Savagaonkar, Innovative Instructions and Software Model for Isolated Execution, HASP, 2013.
[5]
M. Hoekstra, R. Lal, P. Pappachan, V. Phegade, and J. Del Cuvillo, Using Innovative Instructions to Create Trustworthy Software Solutions, HASP, 2013.
[6]
A. Baumann, M. Peinado, and G. Hunt, Shielding Applications from an Untrusted Cloud with Haven, OSDI, 2014.
[7]
Synopsys, Inc., Open Source Report 2014, http://go.coverity.com/rs/157-LQW-289/images/2014-Coverity-Scan-Report.pdf, 2014.
[8]
Spotify AB, Sparkey, https://github.com/spotify/sparkey-java.
[9]
Apache HTTP Server Project, Apache HTTP Server, https://httpd.apache.org/, 2016.
[10]
Eclipse Foundation, Jetty, http://www.eclipse.org/jetty/, 2015.
[11]
W. Reese, Nginx: the High-Performance Web Server and Reverse Proxy, Linux Journal, vol. 2008, no. 173, 2008.
[12]
P. Hunt, M. Konar, F. Junqueira, and B. Reed, ZooKeeper: Wait-Free Coordination for Internet-Scale Systems, USENIXATC, 2010.
[13]
Intel Software Guard Extensions (Intel SGX) SDK, https://software.intel.com/sgx-sdk.
[14]
F. P. Junqueira, B. C. Reed, and M. Serafini, Zab: High-performance broadcast for primary-backup systems, DSN, 2011.
[15]
F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M. Peinado, G. Mainar-Ruiz, and M. Russinovich, VC3: Trustworthy Data Analytics in the Cloud Using SGX, SOSP, 2015.
[16]
Y. Xu, W. Cui, and M. Peinado, Controlled-channel attacks: Deterministic side channels for untrusted operating systems, IEEE, 2015.
[17]
CVE-ID: CVE-2016-0494. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2016-0494, 2016.
[18]
CVE-ID: CVE-2016-0687. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2016-0687, 2016.
[19]
CVE-ID: CVE-2016-3427. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2016-3427, 2016.
[20]
CVE-ID: CVE-2016-3443. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2016-3443, 2016.
[21]
I. Anati, S. Gueron, S. Johnson, and V. Scarlata, Innovative Technology for CPU Based Attestation and Sealing, HASP, 2013.
[22]
M. Halcrow, eCryptfs: An enterprise-class encrypted filesystem for linux, Proceedings of the 2005 Linux Symposium, 2005.
[23]
M. Castro, B. Liskov, et al., Practical Byzantine fault tolerance, vol. 99, 1999.
[24]
J. Beekman, J. Manferdelli, and D. Wagner, Attestation transparency: Building secure internet services for legacy clients, 2016.
[25]
A. Carroll, M. Juarez, J. Polk, and T. Leininger, Microsoft Palladium: A Business Overview, Microsoft Content Security Business Unit, 2002.
[26]
M. Peinado, Y. Chen, P. England, and J. Manferdelli, NGSCB: A Trusted Open System, Information Security and Privacy, 2004.
[27]
R. Ta-Min, L. Litty, and D. Lie, Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable, OSDI, 2006.
[28]
X. Chen, T. Garfinkel, E. C. Lewis, P. Subrahmanyam, C. A. Waldspurger, D. Boneh, J. Dwoskin, and D. R. Ports, Overshadow: A Virtualization-based Approach to Retrofitting Protection in Commodity Operating Systems, ASPLOS, 2008.
[29]
J. Criswell, N. Dautenhahn, and V. Adve, Virtual Ghost: Protecting Applications from Hostile Operating Systems, ASPLOS, 2014.
[30]
Lindemann, M. and Perez, R. and Sailer, R. and van Doorn, L. and Smith, S.W., Building the IBM 4758 secure coprocessor, Computer, 2001.
[31]
Trusted Computing Group, Trusted Platform Module Main Specification. version 1.2.
[32]
S. Bajaj and R. Sion, TrustedDB: A Trusted Hardware Based Database with Privacy and Data Confidentiality, SIGMOD, 2011.
[33]
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki, Flicker: An Execution Infrastructure for TCB Minimization, EuroSys, 2008.
[34]
F. Zhang, J. Chen, H. Chen, and B. Zang, CloudVisor: Retrofitting Protection of Virtual Machines in Multitenant Cloud with Nested Virtualization, SOSP, 2011.
[35]
ARM Limited, ARM Security Technology - Building a Secure System using TrustZone Technology, 2009.
[36]
N. Santos, H. Raj, S. Saroiu, and A. Wolman, Using ARM Trustzone to Build a Trusted Language Runtime for Mobile Applications, ASPLOS, 2014.
[37]
R. Strackx, P. Philippaerts, and F. Vogels, Idea: Towards an Inverted Cloud, Engineering Secure Software and Systems, 2015.
[38]
P. Williams, R. Sion, and D. Shasha, The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties, NDSS, 2009.
[39]
R. A. Popa, E. Stark, S. Valdez, J. Helfer, N. Zeldovich, and H. Balakrishnan, Building Web Applications on Top of Encrypted Data Using Mylar, NSDI, 2014.
[40]
S. Brenner, C. Wulf, and R. Kapitza, Running ZooKeeper Coordination Services in Untrusted Clouds, HotDep, 2014.
[41]
R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, CryptDB: Protecting Confidentiality with Encrypted Query Processing, SOSP, 2011.

Cited By

View all
  • (2024)Toward an SGX-Friendly Java RuntimeIEEE Transactions on Computers10.1109/TC.2023.331840073:1(44-57)Online publication date: 1-Jan-2024
  • (2024)FastSGX: A Message-Passing Based Runtime for SGXAdvanced Information Networking and Applications10.1007/978-3-031-57916-5_7(74-85)Online publication date: 9-Apr-2024
  • (2023)Secure Partitioning of Cloud Applications, with Cost Look-AheadFuture Internet10.3390/fi1507022415:7(224)Online publication date: 22-Jun-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
Middleware '16: Proceedings of the 17th International Middleware Conference
November 2016
280 pages
ISBN:9781450343008
DOI:10.1145/2988336
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Apache ZooKeeper
  2. Cloud Computing
  3. Intel SGX

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

Middleware '16
Sponsor:
  • ACM
  • USENIX Assoc

Acceptance Rates

Overall Acceptance Rate 203 of 948 submissions, 21%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)56
  • Downloads (Last 6 weeks)8
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Toward an SGX-Friendly Java RuntimeIEEE Transactions on Computers10.1109/TC.2023.331840073:1(44-57)Online publication date: 1-Jan-2024
  • (2024)FastSGX: A Message-Passing Based Runtime for SGXAdvanced Information Networking and Applications10.1007/978-3-031-57916-5_7(74-85)Online publication date: 9-Apr-2024
  • (2023)Secure Partitioning of Cloud Applications, with Cost Look-AheadFuture Internet10.3390/fi1507022415:7(224)Online publication date: 22-Jun-2023
  • (2023)Confidential Consortium Framework: Secure Multiparty Applications with Confidentiality, Integrity, and High AvailabilityProceedings of the VLDB Endowment10.14778/3626292.362630417:2(225-240)Online publication date: 1-Oct-2023
  • (2023)Accelerating Extra Dimensional Page Walks for Confidential ComputingProceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture10.1145/3613424.3614293(654-669)Online publication date: 28-Oct-2023
  • (2023)Intel Software Guard Extensions Applications: A SurveyACM Computing Surveys10.1145/359302155:14s(1-38)Online publication date: 17-Jul-2023
  • (2023)SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic ExecutionProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623213(2710-2724)Online publication date: 15-Nov-2023
  • (2023)DID We Miss Anything?: Towards Privacy-Preserving Decentralized ID ArchitectureIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.323595120:6(4881-4898)Online publication date: Nov-2023
  • (2023)QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and TransparencyIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.313740320:1(478-491)Online publication date: 1-Jan-2023
  • (2023)I Can’t Escape Myself: Cloud Inter-Processor Attestation and Sealing using Intel SGX2023 IEEE 28th Pacific Rim International Symposium on Dependable Computing (PRDC)10.1109/PRDC59308.2023.00032(198-208)Online publication date: 24-Oct-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media