论文标题
SGX-MR:调节用于保护数据密集型SGX应用程序访问模式的数据流
SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications
论文作者
论文摘要
英特尔SGX一直是一个受欢迎的值得信赖的执行环境(TEE),用于保护在不受信任平台(例如云)上运行的应用程序的完整性和机密性。但是,对手仍然可以观察到基于SGX的程序的访问模式,这可能会泄漏重要的信息以获得成功的攻击。研究人员一直在尝试遗忘的RAM(ORAM)来解决访问模式的隐私。奥兰(Oram)是一种强大的低级原始原始性,可为任何I/O操作提供应用程序不合时宜的保护。我们发现某些特定于应用程序的访问模式,例如顺序块I/O,不会为对手提供其他信息。其他,例如分类,可以用比Oram更有效的特定遗忘算法代替。面临的挑战是,开发人员可能需要研究特定于应用程序的访问模式的所有细节,以设计合适的解决方案,这是耗时且容易出错的解决方案。在本文中,我们介绍了基于SGX的轻质MAPREDUCE(SGX-MR)方法,该方法调节数据密集型SGX应用程序的数据流程,以便于更轻松的应用程序级别的访问模式分析和保护。它使用MapReduce框架涵盖了大量的数据密集型应用程序,并且可以使用少量的内存足迹来实现整个框架。通过此框架,我们检查了数据处理的阶段,确定了需要保护的访问模式,并设计了相应的有效保护方法。我们的实验表明,基于SGX-MR的应用程序比基于ORAM的实现要高得多。
Intel SGX has been a popular trusted execution environment (TEE) for protecting the integrity and confidentiality of applications running on untrusted platforms such as cloud. However, the access patterns of SGX-based programs can still be observed by adversaries, which may leak important information for successful attacks. Researchers have been experimenting with Oblivious RAM (ORAM) to address the privacy of access patterns. ORAM is a powerful low-level primitive that provides application-agnostic protection for any I/O operations, however, at a high cost. We find that some application-specific access patterns, such as sequential block I/O, do not provide additional information to adversaries. Others, such as sorting, can be replaced with specific oblivious algorithms that are more efficient than ORAM. The challenge is that developers may need to look into all the details of application-specific access patterns to design suitable solutions, which is time-consuming and error-prone. In this paper, we present the lightweight SGX based MapReduce (SGX-MR) approach that regulates the dataflow of data-intensive SGX applications for easier application-level access-pattern analysis and protection. It uses the MapReduce framework to cover a large class of data-intensive applications, and the entire framework can be implemented with a small memory footprint. With this framework, we have examined the stages of data processing, identified the access patterns that need protection, and designed corresponding efficient protection methods. Our experiments show that SGX-MR based applications are much more efficient than ORAM-based implementations.