Private computation on public clouds

dc.contributor.advisorWitchel, Emmett
dc.contributor.committeeMemberNellans, David W
dc.contributor.committeeMemberRossbach, Christopher J
dc.contributor.committeeMemberShacham, Hovav
dc.creatorHunt, Tyler Scott
dc.creator.orcid0000-0001-6844-4116
dc.date.accessioned2021-06-10T16:37:47Z
dc.date.available2021-06-10T16:37:47Z
dc.date.created2020-08
dc.date.issued2020-08-14
dc.date.submittedAugust 2020
dc.date.updated2021-06-10T16:37:48Z
dc.description.abstractPublic clouds offer valuable services at the expense of privacy. Since the cloud provider controls the privileged software on their machines (the operating system and the hypervisor), they enjoy access to the secrets processed by the applications they host. As a result, users must either trust public clouds or avoid them. Recently, hardware manufacturers have extended CPU designs to provide trusted execution environments (TEEs). Hardware ensures the data inside a TEE can only be accessed by the code inside that TEE, protecting secrets from all software that the provider controls. However, TEEs do not provide meaningful security for many applications on their own. In practice, many applications are proprietary or make use of accelerators like GPUs. Code inside the TEE has access to user secrets and the freedom to communicate them to the outside world; users cannot vet proprietary code to ensure it does not exercise that freedom (accidentally or intentionally). GPUs are not controlled by the CPU directly but instead by drivers under the cloud provider’s control, making it trivial for the cloud provider to extract secrets that the user offloads to a GPU for processing. GPU TEEs can prevent unauthorized access to GPU memory, but communication with the GPU can still leak information. We demonstrate system designs that leverage existing (CPU) and pro- posed (GPU) TEEs that protect users‘ data even when the application code is colluding with the cloud provider to steal it, or when the user offloads parts of the application to GPUs.
dc.description.departmentComputer Scienceseng
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://hdl.handle.net/2152/86421
dc.identifier.urihttp://dx.doi.org/10.26153/tsw/13372
dc.language.isoen
dc.subjectSecurity
dc.subjectCloud computing
dc.subjectTrusted execution environment
dc.subjectTEE
dc.subjectSecure hardware
dc.subjectTrusted hardware
dc.subjectSGX
dc.titlePrivate computation on public clouds
dc.typeThesis
dc.type.materialtext
thesis.degree.departmentComputer Sciences
thesis.degree.disciplineComputer Science
thesis.degree.grantorThe University of Texas at Austin
thesis.degree.levelDoctoral
thesis.degree.nameDoctor of Philosophy

Access full-text files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
HUNT-DISSERTATION-2020.pdf
Size:
1.99 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
PROQUEST_LICENSE.txt
Size:
4.45 KB
Format:
Plain Text
Description:
No Thumbnail Available
Name:
LICENSE.txt
Size:
1.84 KB
Format:
Plain Text
Description: