Back to Search Start Over

Survey of research on confidential computing.

Authors :
Feng, Dengguo
Qin, Yu
Feng, Wei
Li, Wei
Shang, Ketong
Ma, Hongzhan
Source :
IET Communications (Wiley-Blackwell); Jun2024, Vol. 18 Issue 9, p535-556, 22p
Publication Year :
2024

Abstract

As the global data strategy deepens and data elements accelerate integrating and flowing more rapidly, the demand for data security and privacy protection has become increasingly prominent. Confidential computing emerges as a crucial security technology to solve security and privacy problem, and it is also a hot subject of in contemporary security technologies. Leveraging collaborative security in both hardware and software, it builds a trusted execution environment to ensure confidentiality and integrity protection for data in use. This paper provides a comprehensive overview of the development process of confidential computing, summarizing its current research status and issues, which focuses on the security requirements for data security and privacy protection. Furthermore, it deeply analyses the common technical features of confidential computing, and proposes a trusted confidential computing architecture based on collaborative hardware and software trust. Then, it elaborates on the research status and issues of confidential computing from four aspects: hardware security, architecture and key technologies, applications, and standards and evaluation. Finally, this paper provides a synthesis and outlook for the future development of confidential computing. In summary, confidential computing is currently in a rapidly developing stage and will play an important role in cyber security in the future. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
17518628
Volume :
18
Issue :
9
Database :
Complementary Index
Journal :
IET Communications (Wiley-Blackwell)
Publication Type :
Academic Journal
Accession number :
177626321
Full Text :
https://doi.org/10.1049/cmu2.12759