Cryptographically Secure Multi-Tenant Provisioning of FPGAs

نویسندگان

  • Arnab Bag
  • Sikhar Patranabis
  • Debapriya Basu Roy
  • Debdeep Mukhopadhyay
چکیده

FPGAs (Field Programmable Gate arrays) have gained massive popularity today as accelerators for a variety of workloads, including big data analytics, and parallel and distributed computing. This has fueled the study of mechanisms to provision FPGAs among multiple tenants as general purpose computing resources on the cloud. Such mechanisms offer new challenges, such as ensuring IP protection and bitstream confidentiality for mutually distrusting clients sharing the same FPGA. A direct adoption of existing IP protection techniques from the single tenancy setting do not completely address these challenges, and are also not scalable enough for practical deployment. In this paper, we propose a dedicated and scalable framework for secure multi-tenant FPGA provisioning that can be easily integrated into existing cloud-based infrastructures such as OpenStack. Our technique has constant resource/memory overhead irrespective of the number of tenants sharing a given FPGA, and is provably secure under well-studied cryptographic assumptions. A prototype implementation of our proposition on Xilinx Virtex-7 UltraScale FPGAs is presented to validate its overheads and scalability when supporting multiple tenants and workloads. To the best of our knowledge, this is the first FPGA provisioning framework to be prototyped that achieves a desirable balance between security and scalability in the multi-tenancy setting.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtual Machine Power Modelling in Multi-tenant Ecosystems: Challenges and Pitfalls

Since energy has emerging as the first class computing resource, we need to characterize this resource in different granularity. On the other hand, the computing paradigm is shifting to the multi-tenant ecosystems. Therefore, characterizing the power consumption on Virtual Machines(VMs), running in data center hosts is necessary to attain energy efficient cloud ecosystems. In this paper, we stu...

متن کامل

Secure Multi-tenant Application in Software as a Service

A multi-tenant application in Software as a Service (SaaS) is accessed by multiple organizations called tenants who have several users attached to them. Multi-tendency enhances resource utilization by effectively sharing resources and reducing cost, increasing productivity and online collaboration. However, providing a secure multi-tenant access to various tenants is still a challenge. Traditio...

متن کامل

High Volume Secure Data Hiding In Video

This paper proposes a Multi-Stream Cipher Stegnographic technique for high volume and secure data hiding in digital video and images. The proposed technique enables high rate of data embedding along with provisioning of confidentiality, integrity and authenticity security services. Embedding is carried out in spatial domain utilizing multiple stream ciphers for embedding signature information. ...

متن کامل

Virtual Network Allocation for Fault Tolerance Balanced with Physical Resources Consumption in a Multi-Tenant Data Center

In a multi-tenant data center, nodes and links of tenants’ virtual networks (VNs) share a single component of the physical substrate network (SN). The failure of a single SN component can thereby cause the simultaneous failures of multiple nodes and links in a single VN; this complex of failures must significantly disrupt the services offered on the VN. In the present paper, we clarify how the ...

متن کامل

PACE: Proactively-Secure Accumulo with Cryptographic Enforcement

Cloud-hosted databases have many compelling benefits, including high availability, flexible resource allocation, and resiliency to attack, but it requires that cloud tenants cede control of their data to the cloud provider. In this paper, we describe Proactively-secure Accumulo with Cryptographic Enforcement (PACE), a client-side library that cryptographically protects a tenant’s data, returnin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1802.04136  شماره 

صفحات  -

تاریخ انتشار 2018