{"title":"A Survey on Security Concerns and Their Actual Solutions for using FPGAs in Cloud Computing","authors":"P. Rosero-Montalvo","doi":"10.1109/LA-CCI48322.2021.9769794","DOIUrl":null,"url":null,"abstract":"Nowadays, FPGAs are essential tools for hardware accelerations in Cloud computing. However, a traditional architecture FPGA is still single-tenant, and the increasing demand for FPGAs in Cloud leads to the need for methods to supporting FPGA multi-tenancy. Moreover, it causes motivations of malicious users targeting FPGAs to exploit their security weaknesses. Therefore, an Trusted Execution Environment combining with high computational resources of the FPGAs gives new security opportunities for Trusted Computing. This paper analyzed FPGA security concerns in three criteria: software flaws, hardware flaws, and threat model with their relevant approaches to mitigate them. Finally, we explore new cloud security applications implementing FPGAs and TEE criteria.","PeriodicalId":431041,"journal":{"name":"2021 IEEE Latin American Conference on Computational Intelligence (LA-CCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Latin American Conference on Computational Intelligence (LA-CCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LA-CCI48322.2021.9769794","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Nowadays, FPGAs are essential tools for hardware accelerations in Cloud computing. However, a traditional architecture FPGA is still single-tenant, and the increasing demand for FPGAs in Cloud leads to the need for methods to supporting FPGA multi-tenancy. Moreover, it causes motivations of malicious users targeting FPGAs to exploit their security weaknesses. Therefore, an Trusted Execution Environment combining with high computational resources of the FPGAs gives new security opportunities for Trusted Computing. This paper analyzed FPGA security concerns in three criteria: software flaws, hardware flaws, and threat model with their relevant approaches to mitigate them. Finally, we explore new cloud security applications implementing FPGAs and TEE criteria.