July 26, 2022

Confidential Computing: Data Security And Processing


computing

In recent times there has been some worry about the protection of files or jobs during their storage on the cloud or their movement across networks, but what about during the processing? This is an issue since data needs to be secured regardless of how it is utilized. We have learned that encryption as we know it is not sufficient in this area, as applications need access to information in unencrypted format during the time it's operating.

Confidential computing was developed to minimize data exposure in the cloud. It is a security model which utilizes hardware-based data execution environments that provide a trusted environment to execute data. Confidential Computing uses a Trusted Execution Environment to protect cloud data and limit access to it.

The Confidential Computing Consortium (CCC) was established under the mandate of the Linux Foundation working hand-in-hand with software and hardware vendors like Intel, Google, Microsoft, IBM and Red Hat. The goal of the CCC is to create an environment that is secure and does not rely on proprietary software to manage Azure confidential computing environments.

What is Confidential Computing?

Data is separated using hardware-based techniquesthat perform in-memory data encryption without showing the data on the cloud to the whole system. The data is stored in TEE. It is hard to view the data outside even using a debugger since it is protected through hardware-based methods. TEE is a container that is protected that protects a portion of memory and processor. It is possible to use the TEE can be utilized to run software that hides code and data from anyone outside of the secure execution environment. External access that is not authorized is blocked by encryption mechanisms. Confidential Computing therefore isolates the software and data from the hardware, with the latter secured.

A good example of this is the application of tools like Intel's Software Protection Extensions (SGX) which is a tool that allows you to encrypt data in memory, or utilize an SDK to develop TEE in firmware. The Microsoft SDK is an open source framework that allows developers create TEE apps using one abstraction. Red Hat's Enarx Project and Asylo Project provide similar abstraction layering. In any event, Azure confidential computing requires collaboration with a range of industry companies, including hardware vendors, cloud providers, developers, open source experts, academics and more.


Why is Confidentiality Computing Important?

Cloud computing adoption can be increased by enhancing security. Confidential Computing allows you to move highly sensitive data and IP addresses to cloud. The key advantages of Confidential Computing are:

E2E encryption security.

Data protection in execution.

Cloud AWS Nitro Enclaves provides greater customer control.

Enhances transparency and builds confidence.

Protects against use that is not authenticated.

Facilitates movement between different environments.

Market players

The diverse companies members of the CCC offer their own products with their own particularities and sometimes, they focus on various sectors. It is important to mention Microsoft Azure, Google Cloud, and AWS Nitro among others.

Microsoft Azure reduces the risk of data theft and security breaches. Azure already has a variety of tools for protecting data at rest and also encryption in transit with secure protocols such as TLS or HTTPS. The company is now offering encrypted data that is used in the process of use.

It offers services such as preventing unauthorised access and protecting intellectual rights of the company in the cloud. This means keeping the records under control to ensure compliance with government regulations.

Google Cloud, which leverages the security capabilities of modern CPUs, gives real-time encryption of data. It also ensures lift-and-shift confidentiality, the ability to use AWS Nitro Enclaves confidential virtual machines without the need to alter the application's code. Organizations can collaborate on research projects in the cloud anywhere in the world without compromising privacy.

Posted by: AvaeKnight at 06:31 AM | No Comments | Add Comment
Post contains 633 words, total size 5 kb.




What colour is a green orange?




15kb generated in CPU 0.0078, elapsed 0.0262 seconds.
35 queries taking 0.0201 seconds, 64 records returned.
Powered by Minx 1.1.6c-pink.