{"title":"基于sgx的云安全模块与用户的唯一控制","authors":"Alexandru Lupascu, Mihai Togan, Cristian Lupascu","doi":"10.1109/ICCOMM.2018.8484262","DOIUrl":null,"url":null,"abstract":"With the evolution of information technologies there is also a significant growth of threats in the digital realm, therefore more and more applications are using cryptographic primitives to ensure the authenticity, integrity and confidentiality of their data. It is absolutely necessary that these cryptographic operations are performed in dedicated security modules which can provide a strong level of security assurance, depending on certification. This paper describes a software security module architecture which uses Intel Software Guard Extensions (SGX) enclaves to protect the cryptographic material. The proposed security module can be used as a service in cloud environment, while still assuring a reasonable level of user's sole control.","PeriodicalId":158890,"journal":{"name":"2018 International Conference on Communications (COMM)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SGX-Based Cloud Security Module with User's Sole Control\",\"authors\":\"Alexandru Lupascu, Mihai Togan, Cristian Lupascu\",\"doi\":\"10.1109/ICCOMM.2018.8484262\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the evolution of information technologies there is also a significant growth of threats in the digital realm, therefore more and more applications are using cryptographic primitives to ensure the authenticity, integrity and confidentiality of their data. It is absolutely necessary that these cryptographic operations are performed in dedicated security modules which can provide a strong level of security assurance, depending on certification. This paper describes a software security module architecture which uses Intel Software Guard Extensions (SGX) enclaves to protect the cryptographic material. The proposed security module can be used as a service in cloud environment, while still assuring a reasonable level of user's sole control.\",\"PeriodicalId\":158890,\"journal\":{\"name\":\"2018 International Conference on Communications (COMM)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Communications (COMM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCOMM.2018.8484262\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Communications (COMM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCOMM.2018.8484262","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SGX-Based Cloud Security Module with User's Sole Control
With the evolution of information technologies there is also a significant growth of threats in the digital realm, therefore more and more applications are using cryptographic primitives to ensure the authenticity, integrity and confidentiality of their data. It is absolutely necessary that these cryptographic operations are performed in dedicated security modules which can provide a strong level of security assurance, depending on certification. This paper describes a software security module architecture which uses Intel Software Guard Extensions (SGX) enclaves to protect the cryptographic material. The proposed security module can be used as a service in cloud environment, while still assuring a reasonable level of user's sole control.