Secure Content-Based Routing Using Intel Software Guard Extensions

@article{Pires2016SecureCR,
  title={Secure Content-Based Routing Using Intel Software Guard Extensions},
  author={Rafael Pires and Marcelo Pasin and Pascal Felber and Christof Fetzer},
  journal={Proceedings of the 17th International Middleware Conference},
  year={2016}
}
Content-based routing (CBR) is a powerful model that supports scalable asynchronous communication among large sets of geographically distributed nodes. Yet, preserving privacy represents a major limitation for the wide adoption of CBR, notably when the routers are located in public clouds. Indeed, a CBR router must see the content of the messages sent by data producers, as well as the filters (or subscriptions) registered by data consumers. This represents a major deterrent for companies for… 

Figures and Tables from this paper

Secret Sharing in Pub/Sub Using Trusted Execution Environments
TLDR
HyShare is a hybrid broker network used for the purposes of sharing a secret between communicating publishers and subscribers that combines regular brokers that use Shamir's secret sharing scheme and brokers with SGX to reduce the overall number of messages needed to share a secret.
Achieving Data Dissemination with Security using FIWARE and Intel Software Guard Extensions (SGX)
TLDR
A new component for key management that, together with other FIWARE components, can be used to provide privacy, confidentiality, and integrity guarantees for IoT data, and it presents acceptable memory costs when considering the benefit of the privacy guarantees achieved.
IBBE-SGX: Cryptographic Group Access Control Using Trusted Execution Environments
TLDR
This paper introduces IBBE-SGX, a new cryptographic access control extension that is efficient both in terms of computation and storage even when processing large and dynamic workloads of membership operations, while at the same time offering zero knowledge guarantees.
Slick: Secure Middleboxes using Shielded Execution
TLDR
Slick provides hardware-assisted memory protection, and configuration and attestation service for seamless and verifiable deployment of middleboxes, and added several new features for commonly required functionalities: new specialized Click elements for secure packet processing, secure shared memory packet transfer for NFs chaining, secure state persistence, and memory safety against Iago attacks.
Security, Performance and Energy Trade-Offs of Hardware-Assisted Memory Protection Mechanisms
TLDR
This paper implements and evaluates a publish/subscribe use-case and evaluates the impact of the memory protection mechanisms and the resulting performance and reports on the experience gained while building this system, in particular when having to cope with the technical limitations imposed by SEV and SGX.
ISA-Based Trusted Network Functions And Server Applications In The Untrusted Cloud
TLDR
This paper identifies a number of NF and server application use-cases that trusted execution can be applied to, and leverages Intel's Software Guard Extensions (SGX) architecture to design Trusted Execution Environments (TEEs) for cloud-based NFs and server applications.
A Lightweight MapReduce Framework for Secure Processing with SGX
TLDR
The use of Intel SGX for providing privacy guarantees for MapReduce operations is explored, and based on the evaluation it is concluded that it represents a viable alternative to a cryptographic mechanism.
Privacy-Preserving Location-Based Services by using Intel SGX
TLDR
It is shown that hardware-based trusted execution-environments are a promising alternative for offering proactive and de-facto location-privacy in the context of location-based services and contributes a marginal overhead but also provides near-to-the-perfect results in contrast to spatial cloaking with k-anonymity.
STANlite – A Database Engine for Secure Data Processing at Rack-Scale Level
TLDR
STANlite is an in-memory database engine for SGX-enabled secure data processing in rack-scale environments that performs efficient user-level paging and smartly combines the properties of Remote Direct Memory Access and SGX to reduce the overhead of network-based I/O operations.
SGX-ICN: A Secure and Privacy-Preserving Information-Centric Networking with SGX Enclaves
TLDR
A practical approach to effectively enhancing the security and privacy of ICN by utilizing Intel SGX, a commodity trusted execution environment by leveraging secure enclaves residing on ICN nodes to do computations on sensitive data.
...
...

References

SHOWING 1-10 OF 31 REFERENCES
A First Step Towards Leveraging Commodity Trusted Execution Environments for Network Applications
TLDR
This paper explores the possibility of using Intel SGX to provide security and privacy in a wide range of network applications and shows that leveraging hardware protection of TEEs opens up new possibilities, often at the benefit of a much simplified application/protocol design.
Thrifty privacy: efficient support for privacy-preserving publish/subscribe
TLDR
This paper proposes a novel mechanism that greatly reduces the cost of supporting privacy-preserving filtering based on encrypted matching operators based on a pre-filtering stage that can be combined with containment graphs, if available.
Efficient privacy preserving content based publish subscribe systems
TLDR
This paper proposes a novel approach to preserve the privacy of the subscriptions made by Subscribers and confidentiality of the data published by Content Publishers using cryptographic techniques when third-party Content Brokers are utilized to make routing decisions based on the content.
Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures
TLDR
This paper focuses on enabling provable confidentiality for commonly used applications and subscription languages in CBPS and presents a series of practical provably secure protocols, some of which are novel and others adapted from existing work.
An Efficient Scheme for Preserving Confidentiality in Content-Based Publish-Subscribe Systems
TLDR
This paper describes a practical scheme that preserves confidentiality against eavesdroppers for private content-based publish-subscribe systems over public networks and efficiently supports interval-matching as a predicate function for subscriptions.
Dynamic Access Control in a Content-based Publish/Subscribe System with Delivery Guarantees
  • Yuanyuan Zhao, D. Sturman
  • Computer Science
    26th IEEE International Conference on Distributed Computing Systems (ICDCS'06)
  • 2006
TLDR
This paper defines a deterministic service model of dynamic access controls that enables precise control over event confidentiality in a content-based system that provides reliable delivery and high availability through redundant routes.
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks
TLDR
A novel scheme that supports confidentiality for events and filters, filters can express very complex constraints on events even if brokers are not able to access any information on both events and filter; and finally it does not require publishers and subscribers to share keys.
Confidentiality-Preserving Publish/Subscribe
TLDR
This survey classifies and analyzes different approaches to confidentiality preservation for pub/sub, from applications of trust and access control models to novel encryption techniques, and points to future research directions in this promising field.
Providing basic security mechanisms in broker-less publish/subscribe systems
TLDR
The authentication of publishers and subscribers as well as confidentiality of events is ensured, by adapting the pairing-based cryptography mechanisms, to the needs of a publish/subscribe system, and an algorithm to cluster subscribers according to their subscriptions preserves a weak notion of subscription confidentiality.
A Memory Encryption Engine Suitable for General Purpose Processors
  • S. Gueron
  • Computer Science
    IACR Cryptol. ePrint Arch.
  • 2016
TLDR
The purpose of this paper is to explain how this hardware component of SGX works, and the rationale behind some of its design choices, and to formalize the MEE threat model and security objectives, describe the Mee design, cryptographic properties, security margins, and report some concrete performance results.
...
...