Slick: Secure Middleboxes using Shielded Execution

نویسندگان

  • Bohdan Trach
  • Alfred Krohmer
  • Sergei Arnautov
  • Franz Gregor
  • Pramod Bhatotia
  • Christof Fetzer
چکیده

Cloud computing o‚ers the economies of scale for computational resources with the ease of management, elasticity, and fault tolerance. To take advantage of these bene€ts, many enterprises are contemplating to outsource the middlebox processing services in the cloud. However, middleboxes that process con€dential and private data cannot be securely deployed in the untrusted environment of the (edge) cloud. To securely outsource middleboxes to the cloud, the stateof-the-art systems advocate network processing over the encrypted trac. Unfortunately, these systems support only restrictive middlebox functionalities, and incur prohibitively high overheads due to the complex computations involved over the encrypted trac. Œis motivated the design of Slick—a secure middlebox framework for deploying high-performance Network Functions (NFs) on untrusted commodity servers. Slick exposes a generic interface based on Click to design and implement a wide-range of NFs using its out-of-the box elements and C++ extensions. Slick leverages Scone (a shielded execution framework based on Intel SGX) and Intel DPDK to securely process con€dential data at line rate. More speci€cally, Slick provides hardware-assisted memory protection, and con€guration and aŠestation service for seamless and veri€able deployment of middleboxes. We have also added several new features for commonly required functionalities: new specialized Click elements for secure packet processing, secure shared memory packet transfer for NFs chaining, secure state persistence, an ecient on-NIC timer for SGX enclaves, and memory safety against DPDK-speci€c Iago aŠacks. Furthermore, we have implemented several SGX-speci€c optimizations in Slick. Our evaluation shows that Slick achieves near-native throughput and latency.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Analysis and control of middleboxes in the internet

With the growing size and complexity of the Internet several types of middleboxes have been introduced to the network in order to solve a number of urgent problems. Network Address Translation devices fight against the Internet address depletion problem, caches and proxies help to efficiently distribute content and firewalls protect networks from potential attackers. Unfortunately, middleboxes ...

متن کامل

LightBox: SGX-assisted Secure Network Functions at Near-native Speed

The recent trend of outsourcing network functions, aka. middleboxes, raises confidentiality and integrity concern on redirected packet, runtime state, and processing result. The outsourced middleboxes must be protected against cyber attacks and malicious service provider. It is challenging to simultaneously achieve strong security, practical performance, complete functionality and compatibility...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Privacy-preserving Network Functionality Outsourcing

—Since the advent of software defined networks (SDN), there have been many attempts to outsource the complex and costly local network functionality, i.e. the middlebox, to the cloud in the same way as outsourcing computation and storage. The privacy issues, however, may thwart the enterprises' willingness to adopt this innovation since the underlying configurations of these middleboxes may leak...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1709.04226  شماره 

صفحات  -

تاریخ انتشار 2017