{"title":"在云计算中使用fpga的安全问题及其实际解决方案调查","authors":"P. Rosero-Montalvo","doi":"10.1109/LA-CCI48322.2021.9769794","DOIUrl":null,"url":null,"abstract":"Nowadays, FPGAs are essential tools for hardware accelerations in Cloud computing. However, a traditional architecture FPGA is still single-tenant, and the increasing demand for FPGAs in Cloud leads to the need for methods to supporting FPGA multi-tenancy. Moreover, it causes motivations of malicious users targeting FPGAs to exploit their security weaknesses. Therefore, an Trusted Execution Environment combining with high computational resources of the FPGAs gives new security opportunities for Trusted Computing. This paper analyzed FPGA security concerns in three criteria: software flaws, hardware flaws, and threat model with their relevant approaches to mitigate them. Finally, we explore new cloud security applications implementing FPGAs and TEE criteria.","PeriodicalId":431041,"journal":{"name":"2021 IEEE Latin American Conference on Computational Intelligence (LA-CCI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Survey on Security Concerns and Their Actual Solutions for using FPGAs in Cloud Computing\",\"authors\":\"P. Rosero-Montalvo\",\"doi\":\"10.1109/LA-CCI48322.2021.9769794\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, FPGAs are essential tools for hardware accelerations in Cloud computing. However, a traditional architecture FPGA is still single-tenant, and the increasing demand for FPGAs in Cloud leads to the need for methods to supporting FPGA multi-tenancy. Moreover, it causes motivations of malicious users targeting FPGAs to exploit their security weaknesses. Therefore, an Trusted Execution Environment combining with high computational resources of the FPGAs gives new security opportunities for Trusted Computing. This paper analyzed FPGA security concerns in three criteria: software flaws, hardware flaws, and threat model with their relevant approaches to mitigate them. Finally, we explore new cloud security applications implementing FPGAs and TEE criteria.\",\"PeriodicalId\":431041,\"journal\":{\"name\":\"2021 IEEE Latin American Conference on Computational Intelligence (LA-CCI)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Latin American Conference on Computational Intelligence (LA-CCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LA-CCI48322.2021.9769794\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Latin American Conference on Computational Intelligence (LA-CCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LA-CCI48322.2021.9769794","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Survey on Security Concerns and Their Actual Solutions for using FPGAs in Cloud Computing
Nowadays, FPGAs are essential tools for hardware accelerations in Cloud computing. However, a traditional architecture FPGA is still single-tenant, and the increasing demand for FPGAs in Cloud leads to the need for methods to supporting FPGA multi-tenancy. Moreover, it causes motivations of malicious users targeting FPGAs to exploit their security weaknesses. Therefore, an Trusted Execution Environment combining with high computational resources of the FPGAs gives new security opportunities for Trusted Computing. This paper analyzed FPGA security concerns in three criteria: software flaws, hardware flaws, and threat model with their relevant approaches to mitigate them. Finally, we explore new cloud security applications implementing FPGAs and TEE criteria.