• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here:Home » What is Confidential Computing?

By Abhishek Ghosh July 11, 2023 10:07 am Updated on July 11, 2023

What is Confidential Computing?

Advertisement

Confidential computing is a privacy enhancing computing methodology intended to protecting data. The method isolates sensitive data during processing into a protected CPU enclave and only authorized programmers who have access to the contents of the enclave—the data that is being processed. The methods used to process it—and they are invisible and unknowable to anyone else, including the cloud provider.

Companies rely increasingly on public and hybrid cloud services, which makes it sure that data privacy is respected. The primary goal of confidential computing is to provide greater assurance to the leaders that their data in the cloud is protected and also confidential. This also encourages them to move more of their sensitive data and computing workloads to public cloud services. In order to protect data at rest (in storage and databases) and in transit (over a network connection), cloud providers have offered encryption services for years. By protecting data during processing or runtime, confidential computing eliminates the remaining data security vulnerability.

 

The Process of Confidential Computing

 

Normally we need to unencrypt data (in memory) before it can be processed by an app. This workflow makes the data vulnerable to memory dumps, root user compromises, and other malicious exploits. These exploits can take place before, during, and after data processing.

Advertisement

---

The technology behind Confidential Computing protects data in use by performing computations in a hardware-based trusted execution environment (TEE). A Trusted Execution Environment (TEE) provides a secure or trustworthy runtime environment for applications. A TEE can exist in isolation on a separate processor, directly on the main processor(s) of a computer system, or in a die of a multiprocessor system or a single-chip system (SoC). Only applications that have been specially activated for this purpose can be executed on the TEE. Depending on the manufacturer, there are different technologies for the realization of a TEE.

  1. AMD: Platform Security Processor (PSP), Secure Extension Mode (SEM), Secure Memory Encryption (SME)
  2. ARM: TrustZone
  3. Intel: Trusted Execution Technology (TXT), Intel Active Management Technology, Software Guard Extensions (SGX)
What is Confidential Computing

Diagram credit : Wikipedia

A hypervisor alone does not provide TEE. While it can run different operating systems on one processor, isolation is limited to the processor. A TEE also includes peripherals that can distinguish between access from secure and non-secure applications or operating systems.

Confidential computing leverages TEE. By using embedded encryption keys and embedded attestation mechanisms, the TEE is secured, ensuring that only authorized application code has access to the keys. In the event that malware attempts to access the keys — or if the authorized code is hacked or altered in any way — the TEE denies access and cancels the computation. This is how the sensitive data can be protected in memory till the app instructs the TEE to decrypt and proceed processing. In addition to TEE, remote cryptographic attestation is a part of confidential computing.

 

What are the Benefits of Confidential Computing?

 

Confidential computing and TEE can be used to protect various things which requires privacy such as business logic, analytics or some special applications. Today, TEE technology is mainly used on smartphones and tablets, e.g. for DRM. The further development and standardization of this technology is crucial for applications such as mobile banking and NFC payment options. The concept of Bring your own device (BYOD), the creation of a private area parallel to a secure area for company data, is also based on the TEE concept.

An edge computing framework brings enterprise applications closer to data sources like IoT devices or local edge servers in order to protect data processed at the edge. It is possible to protect data and applications at edge nodes with confidential computing when this framework of confidential computing will be used.

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What is Confidential Computing?

  • Cloud Computing Articles – List With Description of all we have Published

    Cloud Computing Solution penetrating as business solution and in day to day usage. Here is list of all articles on Cloud computing we have published so far.

  • How Does Edge Computing Work?

    Edge computing is becoming enormously important in the age of IoT and 5G. Edge computing is revolutionizing the way data aggregated, processed and transferred to millions of devices worldwide. While the goal of the adoption of edge computing was initially to reduce the distances for data transmission, it is now about more: In particular, the […]

  • Using the tee Command and Difference With cat Command

    The tee command converts a standard output into a standard input and also can write this to files. So tee is practically only about writing to a file. The cat command is for reading (both input and files) and writing (with > and >>) to files. cat is a powerful and safe tool. tee is […]

  • What is in-memory computing? Use of in-memory computing

    In-memory computing has been around for several years. Niche which relies on this technology includes telecom, social networks and trading.

performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • Hybrid Multi-Cloud Environments Are Becoming UbiquitousJuly 12, 2023
  • Data Protection on the InternetJuly 12, 2023
  • Basics of BJT TransistorJuly 11, 2023
  • What is Confidential Computing?July 11, 2023
  • How a MOSFET WorksJuly 10, 2023
PC users can consult Corrine Chorney for Security.

Want to know more about us?

Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy