Confidential computing and related technologies: a critical review

Abstract This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also...

Full description

Bibliographic Details
Main Authors: Muhammad Usama Sardar, Christof Fetzer
Format: Article
Language:English
Published: SpringerOpen 2023-05-01
Series:Cybersecurity
Subjects:
Online Access:https://doi.org/10.1186/s42400-023-00144-1
_version_ 1797832034528264192
author Muhammad Usama Sardar
Christof Fetzer
author_facet Muhammad Usama Sardar
Christof Fetzer
author_sort Muhammad Usama Sardar
collection DOAJ
description Abstract This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair. We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues. These recommendations are the first step towards more precise definitions and reliable comparisons in the future.
first_indexed 2024-04-09T14:01:15Z
format Article
id doaj.art-961ec009e706409c8db35e3d4f96f2d5
institution Directory Open Access Journal
issn 2523-3246
language English
last_indexed 2024-04-09T14:01:15Z
publishDate 2023-05-01
publisher SpringerOpen
record_format Article
series Cybersecurity
spelling doaj.art-961ec009e706409c8db35e3d4f96f2d52023-05-07T11:16:32ZengSpringerOpenCybersecurity2523-32462023-05-01611710.1186/s42400-023-00144-1Confidential computing and related technologies: a critical reviewMuhammad Usama Sardar0Christof Fetzer1Faculty of Computer Science, Technische Universität DresdenFaculty of Computer Science, Technische Universität DresdenAbstract This research critically reviews the definition of confidential computing (CC) and the security comparison of CC with other related technologies by the Confidential Computing Consortium (CCC). We demonstrate that the definitions by CCC are ambiguous, incomplete and even conflicting. We also demonstrate that the security comparison of CC with other technologies is neither scientific nor fair. We highlight the issues in the definitions and comparisons and provide initial recommendations for fixing the issues. These recommendations are the first step towards more precise definitions and reliable comparisons in the future.https://doi.org/10.1186/s42400-023-00144-1Confidential Computing (CC)Trusted Execution Environment (TEE)Homomorphic Encryption (HE)Trusted Platform Module (TPM)Formal methods
spellingShingle Muhammad Usama Sardar
Christof Fetzer
Confidential computing and related technologies: a critical review
Cybersecurity
Confidential Computing (CC)
Trusted Execution Environment (TEE)
Homomorphic Encryption (HE)
Trusted Platform Module (TPM)
Formal methods
title Confidential computing and related technologies: a critical review
title_full Confidential computing and related technologies: a critical review
title_fullStr Confidential computing and related technologies: a critical review
title_full_unstemmed Confidential computing and related technologies: a critical review
title_short Confidential computing and related technologies: a critical review
title_sort confidential computing and related technologies a critical review
topic Confidential Computing (CC)
Trusted Execution Environment (TEE)
Homomorphic Encryption (HE)
Trusted Platform Module (TPM)
Formal methods
url https://doi.org/10.1186/s42400-023-00144-1
work_keys_str_mv AT muhammadusamasardar confidentialcomputingandrelatedtechnologiesacriticalreview
AT christoffetzer confidentialcomputingandrelatedtechnologiesacriticalreview