Slick: Secure Middleboxes using Shielded Execution
نویسندگان
چکیده
Cloud computing oers the economies of scale for computational resources with the ease of management, elasticity, and fault tolerance. To take advantage of these benets, many enterprises are contemplating to outsource the middlebox processing services in the cloud. However, middleboxes that process condential and private data cannot be securely deployed in the untrusted environment of the (edge) cloud. To securely outsource middleboxes to the cloud, the stateof-the-art systems advocate network processing over the encrypted trac. Unfortunately, these systems support only restrictive middlebox functionalities, and incur prohibitively high overheads due to the complex computations involved over the encrypted trac. is motivated the design of Slick—a secure middlebox framework for deploying high-performance Network Functions (NFs) on untrusted commodity servers. Slick exposes a generic interface based on Click to design and implement a wide-range of NFs using its out-of-the box elements and C++ extensions. Slick leverages Scone (a shielded execution framework based on Intel SGX) and Intel DPDK to securely process condential data at line rate. More specically, Slick provides hardware-assisted memory protection, and conguration and aestation service for seamless and veriable deployment of middleboxes. We have also added several new features for commonly required functionalities: new specialized Click elements for secure packet processing, secure shared memory packet transfer for NFs chaining, secure state persistence, an ecient on-NIC timer for SGX enclaves, and memory safety against DPDK-specic Iago aacks. Furthermore, we have implemented several SGX-specic optimizations in Slick. Our evaluation shows that Slick achieves near-native throughput and latency.
منابع مشابه
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملAnalysis and control of middleboxes in the internet
With the growing size and complexity of the Internet several types of middleboxes have been introduced to the network in order to solve a number of urgent problems. Network Address Translation devices fight against the Internet address depletion problem, caches and proxies help to efficiently distribute content and firewalls protect networks from potential attackers. Unfortunately, middleboxes ...
متن کاملLightBox: SGX-assisted Secure Network Functions at Near-native Speed
The recent trend of outsourcing network functions, aka. middleboxes, raises confidentiality and integrity concern on redirected packet, runtime state, and processing result. The outsourced middleboxes must be protected against cyber attacks and malicious service provider. It is challenging to simultaneously achieve strong security, practical performance, complete functionality and compatibility...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملPrivacy-preserving Network Functionality Outsourcing
—Since the advent of software defined networks (SDN), there have been many attempts to outsource the complex and costly local network functionality, i.e. the middlebox, to the cloud in the same way as outsourcing computation and storage. The privacy issues, however, may thwart the enterprises' willingness to adopt this innovation since the underlying configurations of these middleboxes may leak...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1709.04226 شماره
صفحات -
تاریخ انتشار 2017