Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2022, Vol. 48 ›› Issue (8): 8-18.doi: 10.12267/j.issn.2096-5931.2022.08.002

Previous Articles     Next Articles

A design and security analysis of the confidential computing architecture based on trusted execution environment

WANG Wubing, LIU Bo, FAN Yuan, TAO Lifeng, XU Dongde   

  1. DBAPPSecurity Co., Ltd., Hangzhou 310051, China
  • Received:2022-05-10 Online:2022-08-15 Published:2022-08-26

Abstract:

Nowadays, there is an increasing number of concerns about how to ensure both usability and security of data. In this paper, we propose a trusted execution environment (TEE) based confidential computing architecture to protect the data privacy without affecting its usability. We first abstract a model for the scenarios that privacy-preserving computing applies, then design a TEE-based confidential computing architecture and analysis its security.

Key words: trusted execution environment, confidential computing, privacy preserving computation

CLC Number: