Loading web-font TeX/Math/Italic
E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation | IEEE Journals & Magazine | IEEE Xplore

E3X: Encrypt-Everything-Everywhere ISA eXtensions for Private Computation


Abstract:

The rapid increase of recent privacy attacks has significantly decreased trust on behalf of the users. A root cause to these problems is that modern computer architecture...Show More

Abstract:

The rapid increase of recent privacy attacks has significantly decreased trust on behalf of the users. A root cause to these problems is that modern computer architectures have always been designed for performance, while security protections are traditionally addressed reactively. Practical security protections, such as Intel SGX, rely on processing unencrypted data in the architectural state, which leaves them exposed to software attacks (e.g., SGXpectre). This work revisits the traditional computation stack and introduces a novel computation paradigm, where data is never decrypted in the architectural state. Through our architecture, data are protected with symmetric or asymmetric encryption and the programmer manipulates them directly in the encrypted domain. To increase performance, we exploit data locality by introducing decryption caches in the microarchitectural state. Our proposal addresses all abstraction levels in the computation stack: from microarchitecture to library support for high-level programming. The proposed architecture is instantiated through new assembly instructions, registers and functional units operating on large integers. In our evaluation, we extend the OpenRISC 1000 architecture and develop open-source libraries for C++. As a case study, we employ data-oblivious benchmarks and observe that for benchmarks with high temporal locality, our architecture can achieve comparable performance to processing unencrypted data.
Published in: IEEE Transactions on Dependable and Secure Computing ( Volume: 19, Issue: 2, 01 March-April 2022)
Page(s): 848 - 861
Date of Publication: 06 July 2020

ISSN Information:

Funding Agency:

No metrics found for this document.

1 Introduction

The proliferation of ubiquitous computing and the recent advances in cloud services have amplified the reliance of millions of users to outsourced computation and storage for their data [1]. Remote servers across the globe are becoming the virtual containers of sensitive data, from banking records and medical information, to file storage and search queries. The numerous benefits of outsourcing, however, are often matched with several limitations in the security and privacy guarantees offered to the end users. Even though cloud providers invest in cryptographic protections and access control mechanisms, examples of high-profile compromises, such as Dropbox in 2012 or Amazon EC2/S3 and LastPass in 2011 [2], emphasize that privacy in outsourced computation remains an unresolved problem.

Usage
Select a Year
2025

View as

Total usage sinceJul 2020:551
051015202530JanFebMarAprMayJunJulAugSepOctNovDec2148000000000
Year Total:33
Data is updated monthly. Usage includes PDF downloads and HTML views.

Contact IEEE to Subscribe

References

References is not available for this document.