Confidential computing and related technologies: a critical review
Abstract This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2023-05-01
|
Series: | Cybersecurity |
Subjects: | |
Online Access: | https://doi.org/10.1186/s42400-023-00144-1 |
_version_ | 1797832034528264192 |
---|---|
author | Muhammad Usama Sardar Christof Fetzer |
author_facet | Muhammad Usama Sardar Christof Fetzer |
author_sort | Muhammad Usama Sardar |
collection | DOAJ |
description | Abstract This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair. We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues. These recommendations are the first step towards more precise definitions and reliable comparisons in the future. |
first_indexed | 2024-04-09T14:01:15Z |
format | Article |
id | doaj.art-961ec009e706409c8db35e3d4f96f2d5 |
institution | Directory Open Access Journal |
issn | 2523-3246 |
language | English |
last_indexed | 2024-04-09T14:01:15Z |
publishDate | 2023-05-01 |
publisher | SpringerOpen |
record_format | Article |
series | Cybersecurity |
spelling | doaj.art-961ec009e706409c8db35e3d4f96f2d52023-05-07T11:16:32ZengSpringerOpenCybersecurity2523-32462023-05-01611710.1186/s42400-023-00144-1Confidential computing and related technologies: a critical reviewMuhammad Usama Sardar0Christof Fetzer1Faculty of Computer Science, Technische Universität DresdenFaculty of Computer Science, Technische Universität DresdenAbstract This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair. We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues. These recommendations are the first step towards more precise definitions and reliable comparisons in the future.https://doi.org/10.1186/s42400-023-00144-1Confidential Computing (CC)Trusted Execution Environment (TEE)Homomorphic Encryption (HE)Trusted Platform Module (TPM)Formal methods |
spellingShingle | Muhammad Usama Sardar Christof Fetzer Confidential computing and related technologies: a critical review Cybersecurity Confidential Computing (CC) Trusted Execution Environment (TEE) Homomorphic Encryption (HE) Trusted Platform Module (TPM) Formal methods |
title | Confidential computing and related technologies: a critical review |
title_full | Confidential computing and related technologies: a critical review |
title_fullStr | Confidential computing and related technologies: a critical review |
title_full_unstemmed | Confidential computing and related technologies: a critical review |
title_short | Confidential computing and related technologies: a critical review |
title_sort | confidential computing and related technologies a critical review |
topic | Confidential Computing (CC) Trusted Execution Environment (TEE) Homomorphic Encryption (HE) Trusted Platform Module (TPM) Formal methods |
url | https://doi.org/10.1186/s42400-023-00144-1 |
work_keys_str_mv | AT muhammadusamasardar confidentialcomputingandrelatedtechnologiesacriticalreview AT christoffetzer confidentialcomputingandrelatedtechnologiesacriticalreview |