Open Access Open Access  Restricted Access Subscription Access

Confidential Computing in Edge-Cloud Hierarchy


Affiliations
1 Institute for Informatics and Automation Problems of NAS RA, Yerevan, Armenia
2 Synopsys, Armenia
 

"The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability.

Keywords

Edge-Cloud Architecture, Hierarchical Data, Confidential Computing, Key Splitting, Authentication, Blockchain.
User
Notifications
Font Size

  • Cao K., Liu Y., Meng G., & Sun Q. (2020) ―An Overview on Edge Computing Research‖. IEEE access, Vol. 8, pp 85714-85728.
  • Lee K., Lam M., Pedarsani R., Papailiopoulos D., & Ramchandran K. (2018) ―Speeding up distributed machine learning using codes‖, IEEE Transactions on Information Theory, Vol. 64, No. 3, pp 1514–1529,
  • Goudarzi M., Wu H., Palaniswami M., & Buyya R. (2021) ―An Application Placement Technique for Concurrent IoT Applications in Edge and Fog Computing Environments‖, IEEE Transactions on Mobile Computing, Vol. 20, No. 4, pp. 1298 – 1311.
  • Taleb T., Samdanis K., Mada B., Flinck H., Dutta S., & Sabella D., (2017) ―On Multi-Access Edge Computing: A Survey of the Emerging 5G Network Edge Cloud Architecture and Orchestration‖, IEEE Communications Surveys & Tutorials, Vol. 19, No. 3, pp 1657–1681.
  • Ferdinand N. & Draper S. C. (2018) ―Hierarchical coded computation‖, IEEE International Symposium on Information Theory (ISIT), pp 1620–1624.
  • Lin J., Yu W., Zhang N., Yang X., Zhang H., & Zhao W. (2017). ―A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications‖. IEEE Internet of Things Journal, Vol. 4, No. 5, 1125-1142.
  • Jose D. V., & Vijayalakshmi A. (2018) ―An Overview of Security in Internet of Things‖, Procedia Computer Science, Elsevier, Vol. 143, pp 744-748.
  • De Donno M., Tange K. P., & Dragoni N. (2019) ―Foundations and evolution of modern computing paradigms: Cloud, IoT, edge, and fog‖, IEEE Access, vol. 7, pp. 150936 – 150948.
  • Baumann A., Peinado M., & Hunt G. (2014) ―Shielding Applications from an Untrusted Cloud with Haven‖, In: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), Broomfield, CO: USENIX Association, pp.267–283.
  • Alaverdyan Y., & Satimova E. (2019) ―Fully Homomorphic Cipher Based on Finite Algebraic Structures‖, Earthline Journal of Mathematical Sciences, Vol. 1, No. 1, pp 97-103.
  • Mulligan P, Gustavo P., Spinale N., Stockwell G, and Vincent H. (2021). Confidential Computing—a brave new world. In International Symposium on Secure and Private Execution Environment Design (SEED). IEEE, pp. 132–138.
  • Alaverdyan Y. (2022) ―Multi Agent Machinery in Construction of Cognitive Systems‖. Journal of NeuroQuantology, Vol. 20, No. 8, pp 2445 -2452.
  • Movsisyan Yu., & Gevorgyan A. (2021) ―Invertible algebras satisfying associative identities with functional variables‖, Asian-European Journal of Mathematics, 2021, Vol. 14, N 1, 2050155 (16 pages).
  • Chor B., Goldwasser S., Micali S. and Awerbuch B. (1985) ―Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults‖, FOCS85, pp. 383-395.
  • Li B. (2021) ―Verifiable Secret Sharing Scheme Based on the Plane Parametric Curve‖. Applied Mathematics, 12, pp. 1021-1030.
  • Cooper J., Donovan D., Seberry J. (1994) ―Secret sharing schemes arising from Latin squares, Bulletin of the Institute of Combinatorics and its Applications, 12, pp. 33-43.
  • Pflugfelder H., (1990) ―Quasigroups and loops‖, Heldermann Verlag, Sigma series in Pure Mathematics, 7, pp.28-59.

Abstract Views: 214

PDF Views: 129




  • Confidential Computing in Edge-Cloud Hierarchy

Abstract Views: 214  |  PDF Views: 129

Authors

Yeghisabet Alaverdyan
Institute for Informatics and Automation Problems of NAS RA, Yerevan, Armenia
Suren Poghosyan
Institute for Informatics and Automation Problems of NAS RA, Yerevan, Armenia
Vahagn Poghosyans
Synopsys, Armenia

Abstract


"The paper introduces confidential computing approaches focused on protecting hierarchical data within edge-cloud network. Edge-cloud network suggests splitting and sharing data between the main cloud and the range of networks near the endpoint devices. The proposed solutions allow data in this two-level hierarchy to be protected via embedding traditional encryption at rest and in transit while leaving the remaining security issues, such as sensitive data and operations in use, in the scope of trusted execution environment. Hierarchical data for each network device are linked and identified through distinct paths between edge and main cloud using individual blockchain. Methods for data and cryptographic key splitting between the edge and the main cloud are based on strong authentication techniques ensuring the shared data confidentiality, integrity and availability.

Keywords


Edge-Cloud Architecture, Hierarchical Data, Confidential Computing, Key Splitting, Authentication, Blockchain.

References