IET Communications (Jun 2024)

Survey of research on confidential computing

  • Dengguo Feng,
  • Yu Qin,
  • Wei Feng,
  • Wei Li,
  • Ketong Shang,
  • Hongzhan Ma

DOI
https://doi.org/10.1049/cmu2.12759
Journal volume & issue
Vol. 18, no. 9
pp. 535 – 556

Abstract

Read online

Abstract As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent. Confidential computing emerges as a crucial security technology to solve security and privacy problem, and it is also a hot subject of in contemporary security technologies. Leveraging collaborative security in both hardware and software, it builds a trusted execution environment to ensure confidentiality and integrity protection for data in use. This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Furthermore, it deeply analyses the common technical features of confidential computing, and proposes a trusted confidential computing architecture based on collaborative hardware and software trust. Then, it elaborates on the research status and issues of confidential computing from four aspects: hardware security, architecture and key technologies, applications, and standards and evaluation. Finally, this paper provides a synthesis and outlook for the future development of confidential computing. In summary, confidential computing is currently in a rapidly developing stage and will play an important role in cyber security in the future.

Keywords