THANK YOU FOR SUBSCRIBING
Significance of Confidential Computing
The technology sector must constantly stay one step ahead of attackers.

By
Apac CIOOutlook | Wednesday, November 09, 2022
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
Trusted execution environments shield proprietary data against the very cloud providers that host it.
FREMONT, CA: The technology sector must constantly stay one step ahead of attackers. However, there is significant ambiguity regarding what is meant by confidential computing.
It is described by AWS as a specific piece of hardware and firmware that divides an interior, often client data, from an exterior, usually a cloud provider. It has features of tiered zero trust, enabling businesses that use cloud providers to further segment data according to security requirements. It can safeguard data while it's being used and strike a balance between sharing and control over the data.
An effort to develop more secure hardware-based execution environments is confidential computing. It is frequently used to safeguard data being used in many situations. Most people agree that securing data while at rest or in transit is simpler than doing so while it is being used. IEEE claims that the contradiction is the issue.
The Confidential Computing Consortium established standards in 2020 by working on its Technical Advisory Council. Several businesses, including Meta (NASDAQ: META), Google (NASDAQ: GOOGL), Huawei, IBM (NYSE: IBM), Microsoft (NASDAQ: MSFT), and Tencent (HKG: 0700), provided their inputs.
Confidential computing can reduce energy consumption by storing high-bandwidth or high-latency data, such as video, in the TEE rather than locally. It could also enable various businesses to share data sets without granting full access.
The TEE is a secure portion of a CPU divided by embedded encryption keys that are only accessible by approved application code. The data remains invisible during calculation and decryption, not even to the operating system or hypervisor. It can be used to safeguard analytics operations or AI/ML algorithms in addition to proprietary business logic and apps.
One of the objectives of cloud service providers who also offer confidential computing is to give their clients peace of mind regarding the cloud provider's access to secret data.
The Google Cloud uses private virtual machines supported by 3rd generation AMD EPYC CPUs and secures encrypted virtualization extensions. The CPU generates and manages node-specific, dedicated keys, which are security keys generated within the hardware during node construction, to keep data encrypted in memory.
Starting with IBM Cloud's Hyper Protect Services and Data Shield in 2018, IBM claims to be on the fourth generation of its secure computing offerings. A cloud hardware security module that has achieved FIPS 140-2 Level 4 certification is proudly included with Hyper Protect services. Both goods have ratings for laws, including HIPAA, GDPR, ISO 27K, and others.
Additionally, IBM offers HPC Cluster, a section of its cloud service where clients can secure their clusters utilising their encrypted operating system and keep their key options. Customers may host a sizable number of Linux workloads inside a TEE to IBM's Secure Execution for Linux solution.
Elastic Cloud Compute, an infrastructure-on-demand service that, by its very nature, necessitates some barriers and doors between Amazon and the user using the services, is supported by AWS's Nitro System. They employ several techniques to build those walls and doors. The Nitro System is one example; it features a unique security chip that cryptographically measures and certifies the system.
The hardware-based security offered by this business is aided by Intel's (NASDAQ: INTC) Software Guard Extensions. They concentrated on offering TEE services designed for the government, financial, and healthcare sectors in 2021.