Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2018

01-12-2018

Ensuring Secure Data Input/Output Operations for SGX ENCLAVE

Authors: D. P. Zegzhda, E. S. Usov, A. V. Nikol’skii, E. Yu. Pavlenko

Published in: Automatic Control and Computer Sciences | Issue 8/2018

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract—

This paper investigates the problem of ensuring secure input/output operations in the Intel SGX technology. The problem is extremely urgent, and its solution will make it possible to protect confidential user data from attacks from different malicious software while finding data outside the enclave. The authors present different methods for solving the posed problem developed by them. The complexity of the practical application of these methods as well as their main disadvantages and advantages are analyzed. The most preferred method which ensures secure storage and processing of data outside the enclave is also chosen.
Literature
1.
go back to reference Intel® 64 and IA-32 Architectures Software Developer’s Manual Volume 3 (3A, 3B, 3C & 3D). https://www.intel.com/content/dam/www/public/us/en/documents/manuals/64-ia-32-architectures-software-developer-system-programming-manual-325384.pdf. Intel® 64 and IA-32 Architectures Software Developer’s Manual Volume 3 (3A, 3B, 3C & 3D). https://​www.​intel.​com/​content/​dam/​www/​public/​us/​en/​documents/​manuals/​64-ia-32-architectures-software-developer-system-programming-manual-325384.​pdf.​
2.
go back to reference Overview of Intel Software Guard Extensions Instructions and Data Structures. https://software.intel.com/en-us/ blogs/2016/06/10/overview-of-intel-software-guard-extensions-instructions-and-data-structures. Overview of Intel Software Guard Extensions Instructions and Data Structures. https://​software.​intel.​com/​en-us/​ blogs/2016/06/10/overview-of-intel-software-guard-extensions-instructions-and-data-structures.
3.
go back to reference Intel SGX Explained. https://eprint.iacr.org/2016/086.pdf. Intel SGX Explained. https://​eprint.​iacr.​org/​2016/​086.​pdf.​
4.
go back to reference Shay Gueron, A Memory Encryption Engine Suitable for General Purpose Processors. https://eprint.iacr.org/ 2016/204.pdf. Shay Gueron, A Memory Encryption Engine Suitable for General Purpose Processors. https://​eprint.​iacr.​org/​ 2016/204.pdf.
5.
go back to reference Usov, E.S., Nikol’skii, A.V., Pavlenko, E.Yu., and Zegzhda, D.P., Ensuring confidentiality of data of users of cloud systems using the Intel SGX technology, Sbornik materialov 15-i mezhdunarodnoi konferentsii Regional’naya informatika (RI 2016) (Proc. 15th Int. Conf. Reg. Inf. (RI 2016)), 2016. Usov, E.S., Nikol’skii, A.V., Pavlenko, E.Yu., and Zegzhda, D.P., Ensuring confidentiality of data of users of cloud systems using the Intel SGX technology, Sbornik materialov 15-i mezhdunarodnoi konferentsii Regional’naya informatika (RI 2016) (Proc. 15th Int. Conf. Reg. Inf. (RI 2016)), 2016.
6.
go back to reference Zegzhda, D.P., Usov, E.S., Nikol’skii, A.V., and Pavlenko, E.Yu., Use of Intel SGX to ensure the confidentiality of data of cloud users, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 848–854.CrossRef Zegzhda, D.P., Usov, E.S., Nikol’skii, A.V., and Pavlenko, E.Yu., Use of Intel SGX to ensure the confidentiality of data of cloud users, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 848–854.CrossRef
7.
go back to reference Usov, E.S., Nikol’skii, A.V., Pavlenko, E.Yu., and Zegzhda, D.P., Organization of secure cloud computing using Intel SGX, Sbornik materialov 25-i nauchno-tekhnicheskoi konferentsii Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii (Proc. 25th Sci.-Tech. Conf. Methods and Technical Means for Ensuring Information Security), 2016. Usov, E.S., Nikol’skii, A.V., Pavlenko, E.Yu., and Zegzhda, D.P., Organization of secure cloud computing using Intel SGX, Sbornik materialov 25-i nauchno-tekhnicheskoi konferentsii Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii (Proc. 25th Sci.-Tech. Conf. Methods and Technical Means for Ensuring Information Security), 2016.
8.
go back to reference Usov, E.S., Nikol’skii, A.V., and Zegzhda, D.P., Ensuring safe data input/output operations for SGX Enclave, Sbornik materialov 26-i nauchno-tekhnicheskoi konferentsii Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii (Proc. 26th Sci. Tech. Conf. Methods and Technical Means for Ensuring Information Security), 2017. Usov, E.S., Nikol’skii, A.V., and Zegzhda, D.P., Ensuring safe data input/output operations for SGX Enclave, Sbornik materialov 26-i nauchno-tekhnicheskoi konferentsii Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii (Proc. 26th Sci. Tech. Conf. Methods and Technical Means for Ensuring Information Security), 2017.
9.
go back to reference Xiaoyu Ruan, Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, 2014. Xiaoyu Ruan, Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, 2014.
10.
go back to reference Khalid Maklai, Intel® Identity Protection Technology (Intel® IPT) with PKI and Protected Transaction Display. https://software.intel.com/sites/default/files/managed/5f/4e/IPTwithPKI_ProtTransDisplay.pdf. Khalid Maklai, Intel® Identity Protection Technology (Intel® IPT) with PKI and Protected Transaction Display. https://​software.​intel.​com/​sites/​default/​files/​managed/​5f/​4e/​IPTwithPKI_​ProtTransDisplay​.​pdf.​
11.
go back to reference Intel® Software Guard Extensions SDK for Windows* OS. https://software.intel.com/sites/default/files/managed/41/58/sgx-sdk-developer-reference-for-windows.pdf. Intel® Software Guard Extensions SDK for Windows* OS. https://​software.​intel.​com/​sites/​default/​files/​managed/​41/​58/​sgx-sdk-developer-reference-for-windows.​pdf.​
Metadata
Title
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE
Authors
D. P. Zegzhda
E. S. Usov
A. V. Nikol’skii
E. Yu. Pavlenko
Publication date
01-12-2018
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2018
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411618080321

Other articles of this Issue 8/2018

Automatic Control and Computer Sciences 8/2018 Go to the issue