Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study

07/31/2023
by   SM Zobaed, et al.
0

Confidential computing has gained prominence due to the escalating volume of data-driven applications (e.g., machine learning and big data) and the acute desire for secure processing of sensitive data, particularly, across distributed environments, such as edge-to-cloud continuum. Provided that the works accomplished in this emerging area are scattered across various research fields, this paper aims at surveying the fundamental concepts, and cutting-edge software and hardware solutions developed for confidential computing using trusted execution environments, homomorphic encryption, and secure enclaves. We underscore the significance of building trust in both hardware and software levels and delve into their applications particularly for machine learning (ML) applications. While substantial progress has been made, there are some barely-explored areas that need extra attention from the researchers and practitioners in the community to improve confidentiality aspects, develop more robust attestation mechanisms, and to address vulnerabilities of the existing trusted execution environments. Providing a comprehensive taxonomy of the confidential computing landscape, this survey enables researchers to advance this field to ultimately ensure the secure processing of users' sensitive data across a multitude of applications and computing tiers.

READ FULL TEXT
research
02/12/2019

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Machine learning has become a critical component of modern data-driven o...
research
08/12/2023

Making Your Program Oblivious: a Comparative Study for Side-channel-safe Confidential Computing

Trusted Execution Environments (TEEs) are gradually adopted by major clo...
research
01/20/2021

secureTF: A Secure TensorFlow Framework

Data-driven intelligent applications in modern online services have beco...
research
04/14/2022

An Exploratory Study of Attestation Mechanisms for Trusted Execution Environments

Attestation is a fundamental building block to establish trust over soft...
research
07/20/2023

Approximate Computing Survey, Part I: Terminology and Software Hardware Approximation Techniques

The rapid growth of demanding applications in domains applying multimedi...
research
05/02/2021

SoK: Opportunities for Software-Hardware-Security Codesign for Next Generation Secure Computing

Users are demanding increased data security. As a result, security is ra...
research
07/30/2023

Towards Learned Predictability of Storage Systems

With the rapid development of cloud computing and big data technologies,...

Please sign up or login with your details

Forgot password? Click here to reset