Building secure distributed applications the DECENT way

04/04/2020
by   Haofan Zheng, et al.
0

Remote attestation (RA) enables distributed applications that deploy trusted code to enclaves on untrusted hosts and authenticate these components remotely. However, trust relationships established by one component may impact the security of the other components that rely on it, making it difficult to reason about the end-to-end security of these applications. Furthermore, traditional RA approaches interact badly with modern web service design, which tends to employ small interacting microservices, short session lifetimes, and little or no state. This paper presents the Decent Application Platform, a framework for building secure decentralized applications. Decent applications authenticate and authorize distributed components using a protocol based on self-attestation certificates, a reusable credential based on remote attestation and verifiable by a third party. Decent components are authenticated not only based on their code, but also based on the other components they trust, ensuring that no transitively-connected components receive unauthorized information. We evaluate the expressiveness and performance of Decent with two applications: DecentRide, a ride-sharing service, and DecentHT, a distributed hash table. On the YCSB benchmark, we show that DecentHT achieves 7.5x higher throughput and 3.67x lower latency compared to a non-Decent implementation.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/14/2022

Reflections on trusting distributed trust

Many systems today distribute trust across multiple parties such that th...
research
06/08/2022

A Framework for Building Secure, Scalable, Networked Enclaves

In 2020, Amazon introduced Nitro enclaves – cloud-based secure enclaves ...
research
01/16/2021

SEDAT:Security Enhanced Device Attestation with TPM2.0

Remote attestation is one of the ways to verify the state of an untruste...
research
06/05/2019

An Interposer-Based Root of Trust: Seize the Opportunity for Secure System-Level Integration of Untrusted Chiplets

Leveraging 2.5D interposer technology, we advocate the integration of un...
research
07/06/2022

fybrrChat: A Distributed Chat Application for Secure P2P Messaging

The growing demand for connecting with each other across the world has p...
research
05/16/2023

Flexible remote attestation of pre-SNP SEV VMs using SGX enclaves

We propose a protocol that explores a synergy between two TEE implementa...
research
05/13/2018

Shattered Trust: When Replacement Smartphone Components Attack

Phone touchscreens, and other similar hardware components such as orient...

Please sign up or login with your details

Forgot password? Click here to reset