Loading…

Shielding Applications from an Untrusted Cloud with Haven

Today’s cloud computing infrastructure requires substantial trust. Cloud users rely on both the provider’s staff and its globally distributed software/hardware platform not to expose any of their private data. We introduce the notion of shielded execution, which protects the confidentiality and inte...

Full description

Saved in:
Bibliographic Details
Published in:ACM transactions on computer systems 2015-09, Vol.33 (3), p.1-26
Main Authors: Baumann, Andrew, Peinado, Marcus, Hunt, Galen
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c286t-eda3b32c412ba6786a574536d29e54ecb3f8f75c106e262388292281143d12e73
cites cdi_FETCH-LOGICAL-c286t-eda3b32c412ba6786a574536d29e54ecb3f8f75c106e262388292281143d12e73
container_end_page 26
container_issue 3
container_start_page 1
container_title ACM transactions on computer systems
container_volume 33
creator Baumann, Andrew
Peinado, Marcus
Hunt, Galen
description Today’s cloud computing infrastructure requires substantial trust. Cloud users rely on both the provider’s staff and its globally distributed software/hardware platform not to expose any of their private data. We introduce the notion of shielded execution, which protects the confidentiality and integrity of a program and its data from the platform on which it runs (i.e., the cloud operator’s OS, VM, and firmware). Our prototype, Haven, is the first system to achieve shielded execution of unmodified legacy applications, including SQL Server and Apache, on a commodity OS (Windows) and commodity hardware. Haven leverages the hardware protection of Intel SGX to defend against privileged code and physical attacks such as memory probes, and also addresses the dual challenges of executing unmodified legacy binaries and protecting them from a malicious host. This work motivated recent changes in the SGX specification.
doi_str_mv 10.1145/2799647
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1770369165</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3815244661</sourcerecordid><originalsourceid>FETCH-LOGICAL-c286t-eda3b32c412ba6786a574536d29e54ecb3f8f75c106e262388292281143d12e73</originalsourceid><addsrcrecordid>eNpd0MFKxDAQBuAgCtZVfIWAB71Uk0mTNMdlUVdY8KB7LmmaulnapCat4ttb2T15Ghg-fmZ-hK4puae04A8glRKFPEEZ5VzmkjF2ijIiWZEDkfQcXaS0J4TMe8iQets52zXOf-DlMHTO6NEFn3AbQ4-1x1s_ximNtsGrLkwN_nbjDq_1l_WX6KzVXbJXx7lA26fH99U637w-v6yWm9xAKcbcNprVDExBodZClkJzWXAmGlCWF9bUrC1byQ0lwoIAVpagAMr5FdZQsJIt0N0hd4jhc7JprHqXjO067W2YUkWlJEwoKvhMb_7RfZiin6-bFeVCCqLErG4PysSQUrRtNUTX6_hTUVL9VVgdK2S_DBZf2A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1715676096</pqid></control><display><type>article</type><title>Shielding Applications from an Untrusted Cloud with Haven</title><source>Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list)</source><source>BSC - Ebsco (Business Source Ultimate)</source><creator>Baumann, Andrew ; Peinado, Marcus ; Hunt, Galen</creator><creatorcontrib>Baumann, Andrew ; Peinado, Marcus ; Hunt, Galen</creatorcontrib><description>Today’s cloud computing infrastructure requires substantial trust. Cloud users rely on both the provider’s staff and its globally distributed software/hardware platform not to expose any of their private data. We introduce the notion of shielded execution, which protects the confidentiality and integrity of a program and its data from the platform on which it runs (i.e., the cloud operator’s OS, VM, and firmware). Our prototype, Haven, is the first system to achieve shielded execution of unmodified legacy applications, including SQL Server and Apache, on a commodity OS (Windows) and commodity hardware. Haven leverages the hardware protection of Intel SGX to defend against privileged code and physical attacks such as memory probes, and also addresses the dual challenges of executing unmodified legacy binaries and protecting them from a malicious host. This work motivated recent changes in the SGX specification.</description><identifier>ISSN: 0734-2071</identifier><identifier>EISSN: 1557-7333</identifier><identifier>DOI: 10.1145/2799647</identifier><language>eng</language><publisher>New York: Association for Computing Machinery</publisher><subject>Cloud computing ; Commodities ; Computer platforms ; Cybersecurity ; Hardware ; Integrity ; Legacy ; Operating systems ; Platforms ; Prototypes ; Specifications ; Structured Query Language-SQL ; Studies</subject><ispartof>ACM transactions on computer systems, 2015-09, Vol.33 (3), p.1-26</ispartof><rights>Copyright Association for Computing Machinery Sep 2015</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c286t-eda3b32c412ba6786a574536d29e54ecb3f8f75c106e262388292281143d12e73</citedby><cites>FETCH-LOGICAL-c286t-eda3b32c412ba6786a574536d29e54ecb3f8f75c106e262388292281143d12e73</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27903,27904</link.rule.ids></links><search><creatorcontrib>Baumann, Andrew</creatorcontrib><creatorcontrib>Peinado, Marcus</creatorcontrib><creatorcontrib>Hunt, Galen</creatorcontrib><title>Shielding Applications from an Untrusted Cloud with Haven</title><title>ACM transactions on computer systems</title><description>Today’s cloud computing infrastructure requires substantial trust. Cloud users rely on both the provider’s staff and its globally distributed software/hardware platform not to expose any of their private data. We introduce the notion of shielded execution, which protects the confidentiality and integrity of a program and its data from the platform on which it runs (i.e., the cloud operator’s OS, VM, and firmware). Our prototype, Haven, is the first system to achieve shielded execution of unmodified legacy applications, including SQL Server and Apache, on a commodity OS (Windows) and commodity hardware. Haven leverages the hardware protection of Intel SGX to defend against privileged code and physical attacks such as memory probes, and also addresses the dual challenges of executing unmodified legacy binaries and protecting them from a malicious host. This work motivated recent changes in the SGX specification.</description><subject>Cloud computing</subject><subject>Commodities</subject><subject>Computer platforms</subject><subject>Cybersecurity</subject><subject>Hardware</subject><subject>Integrity</subject><subject>Legacy</subject><subject>Operating systems</subject><subject>Platforms</subject><subject>Prototypes</subject><subject>Specifications</subject><subject>Structured Query Language-SQL</subject><subject>Studies</subject><issn>0734-2071</issn><issn>1557-7333</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNpd0MFKxDAQBuAgCtZVfIWAB71Uk0mTNMdlUVdY8KB7LmmaulnapCat4ttb2T15Ghg-fmZ-hK4puae04A8glRKFPEEZ5VzmkjF2ijIiWZEDkfQcXaS0J4TMe8iQets52zXOf-DlMHTO6NEFn3AbQ4-1x1s_ximNtsGrLkwN_nbjDq_1l_WX6KzVXbJXx7lA26fH99U637w-v6yWm9xAKcbcNprVDExBodZClkJzWXAmGlCWF9bUrC1byQ0lwoIAVpagAMr5FdZQsJIt0N0hd4jhc7JprHqXjO067W2YUkWlJEwoKvhMb_7RfZiin6-bFeVCCqLErG4PysSQUrRtNUTX6_hTUVL9VVgdK2S_DBZf2A</recordid><startdate>20150901</startdate><enddate>20150901</enddate><creator>Baumann, Andrew</creator><creator>Peinado, Marcus</creator><creator>Hunt, Galen</creator><general>Association for Computing Machinery</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20150901</creationdate><title>Shielding Applications from an Untrusted Cloud with Haven</title><author>Baumann, Andrew ; Peinado, Marcus ; Hunt, Galen</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c286t-eda3b32c412ba6786a574536d29e54ecb3f8f75c106e262388292281143d12e73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Cloud computing</topic><topic>Commodities</topic><topic>Computer platforms</topic><topic>Cybersecurity</topic><topic>Hardware</topic><topic>Integrity</topic><topic>Legacy</topic><topic>Operating systems</topic><topic>Platforms</topic><topic>Prototypes</topic><topic>Specifications</topic><topic>Structured Query Language-SQL</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Baumann, Andrew</creatorcontrib><creatorcontrib>Peinado, Marcus</creatorcontrib><creatorcontrib>Hunt, Galen</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM transactions on computer systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Baumann, Andrew</au><au>Peinado, Marcus</au><au>Hunt, Galen</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Shielding Applications from an Untrusted Cloud with Haven</atitle><jtitle>ACM transactions on computer systems</jtitle><date>2015-09-01</date><risdate>2015</risdate><volume>33</volume><issue>3</issue><spage>1</spage><epage>26</epage><pages>1-26</pages><issn>0734-2071</issn><eissn>1557-7333</eissn><abstract>Today’s cloud computing infrastructure requires substantial trust. Cloud users rely on both the provider’s staff and its globally distributed software/hardware platform not to expose any of their private data. We introduce the notion of shielded execution, which protects the confidentiality and integrity of a program and its data from the platform on which it runs (i.e., the cloud operator’s OS, VM, and firmware). Our prototype, Haven, is the first system to achieve shielded execution of unmodified legacy applications, including SQL Server and Apache, on a commodity OS (Windows) and commodity hardware. Haven leverages the hardware protection of Intel SGX to defend against privileged code and physical attacks such as memory probes, and also addresses the dual challenges of executing unmodified legacy binaries and protecting them from a malicious host. This work motivated recent changes in the SGX specification.</abstract><cop>New York</cop><pub>Association for Computing Machinery</pub><doi>10.1145/2799647</doi><tpages>26</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0734-2071
ispartof ACM transactions on computer systems, 2015-09, Vol.33 (3), p.1-26
issn 0734-2071
1557-7333
language eng
recordid cdi_proquest_miscellaneous_1770369165
source Association for Computing Machinery:Jisc Collections:ACM OPEN Journals 2023-2025 (reading list); BSC - Ebsco (Business Source Ultimate)
subjects Cloud computing
Commodities
Computer platforms
Cybersecurity
Hardware
Integrity
Legacy
Operating systems
Platforms
Prototypes
Specifications
Structured Query Language-SQL
Studies
title Shielding Applications from an Untrusted Cloud with Haven
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-27T11%3A04%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Shielding%20Applications%20from%20an%20Untrusted%20Cloud%20with%20Haven&rft.jtitle=ACM%20transactions%20on%20computer%20systems&rft.au=Baumann,%20Andrew&rft.date=2015-09-01&rft.volume=33&rft.issue=3&rft.spage=1&rft.epage=26&rft.pages=1-26&rft.issn=0734-2071&rft.eissn=1557-7333&rft_id=info:doi/10.1145/2799647&rft_dat=%3Cproquest_cross%3E3815244661%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c286t-eda3b32c412ba6786a574536d29e54ecb3f8f75c106e262388292281143d12e73%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1715676096&rft_id=info:pmid/&rfr_iscdi=true