-
出版商:
Morgan & Claypool
-
出版日期:
2014-06-01
-
售價:
$2,230
-
貴賓價:
9.5 折
$2,119
-
語言:
英文
-
頁數:
209
-
裝訂:
Paperback
-
ISBN:
1627054774
-
ISBN-13:
9781627054775
商品描述
As society rushes to digitize sensitive information and services, it is imperative to adopt adequate security protections. However, such protections fundamentally conflict with the benefits we expect from commodity computers. In other words, consumers and businesses value commodity computers because they provide good performance and an abundance of features at relatively low costs. Meanwhile, attempts to build secure systems from the ground up typically abandon such goals, and hence are seldom adopted. In this book, I argue that we can resolve the tension between security and features by leveraging the trust a user has in one device to enable her to securely use another commodity device or service, without sacrificing the performance and features expected of commodity systems. At a high level, we support this premise by developing techniques to allow a user to employ a small, trusted, portable device to securely learn what code is executing on her local computer. Rather than entrusting her data to the mountain of buggy code likely running on her computer, we construct an on-demand secure execution environment which can perform security-sensitive tasks and handle private data in complete isolation from all other software (and most hardware) on the system. Meanwhile, non-security-sensitive software retains the same abundance of features and performance it enjoys today. Having established an environment for secure code execution on an individual computer, we then show how to extend trust in this environment to network elements in a secure and efficient manner. This allows us to reexamine the design of network protocols and defenses, since we can now execute code on endhosts and trust the results within the network. Lastly, we extend the user's trust one more step to encompass computations performed on a remote host (e.g., in the cloud). We design, analyze, and prove secure a protocol that allows a user to outsource arbitrary computations to commodity computers run by an untrusted remote party (or parties) who may subject the computers to both software and hardware attacks. Our protocol guarantees that the user can both verify that the results returned are indeed the correct results of the specified computations on the inputs provided, and protect the secrecy of both the inputs and outputs of the computations. These guarantees are provided in a non-interactive, asymptotically optimal (with respect to CPU and bandwidth) manner. Thus, extending a user's trust, via software, hardware, and cryptographic techniques, allows us to provide strong security protections for both local and remote computations on sensitive data, while still preserving the performance and features of commodity computers.
商品描述(中文翻譯)
隨著社會急於數位化敏感資訊和服務,採用適當的安全保護措施變得至關重要。然而,這些保護措施與我們對商品電腦所期望的好處根本上存在衝突。換句話說,消費者和企業重視商品電腦,因為它們在相對低的成本下提供良好的性能和豐富的功能。與此同時,從零開始構建安全系統的嘗試通常會放棄這些目標,因此很少被採用。在本書中,我主張我們可以通過利用用戶對一個設備的信任來解決安全性與功能之間的緊張關係,使她能夠安全地使用另一個商品設備或服務,而不犧牲商品系統所期望的性能和功能。從高層次來看,我們通過開發技術來支持這一前提,允許用戶使用一個小型、可信的可攜式設備來安全地了解她的本地電腦上正在執行的代碼。與其將她的數據託付給可能在她的電腦上運行的錯誤百出的代碼,我們構建了一個按需的安全執行環境,該環境可以執行安全敏感的任務並在與系統上所有其他軟件(以及大多數硬件)完全隔離的情況下處理私密數據。與此同時,非安全敏感的軟件仍然保留其當前享有的豐富功能和性能。在為單個電腦建立了安全代碼執行環境之後,我們接著展示如何以安全和高效的方式將對該環境的信任擴展到網絡元素。這使我們能夠重新檢視網絡協議和防禦的設計,因為我們現在可以在終端主機上執行代碼並信任網絡內的結果。最後,我們將用戶的信任再擴展一步,以涵蓋在遠程主機(例如,雲端)上執行的計算。我們設計、分析並證明了一個安全的協議,該協議允許用戶將任意計算外包給由不受信任的遠程方(或多方)運行的商品電腦,這些遠程方可能會對計算機進行軟件和硬件攻擊。我們的協議保證用戶可以驗證返回的結果確實是對所提供輸入的指定計算的正確結果,並保護計算的輸入和輸出的機密性。這些保證以非交互式、漸近最優(相對於 CPU 和帶寬)的方式提供。因此,通過軟件、硬件和密碼技術擴展用戶的信任,使我們能夠為敏感數據的本地和遠程計算提供強大的安全保護,同時仍然保留商品電腦的性能和功能。