Confidential computing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidential computing can be used in conjunction with storage and network encryption, which protect data at rest and data in transit respectively.[1][2] It is designed to address software, protocol, cryptographic, and basic physical and supply-chain attacks, although some critics have demonstrated architectural and side-channel attacks effective against the technology.[3]
The technology protects data in use by performing computations in a hardware-based trusted execution environment (TEE).[3] Confidential data is released to the TEE only once it is assessed to be trustworthy. Different types of confidential computing define the level of data isolation used, whether virtual machine, application, or function, and the technology can be deployed in on-premise data centers, edge locations, or the public cloud. It is often compared with other privacy-enhancing computational techniques such as fully homomorphic encryption, secure multi-party computation, and Trusted Computing.
Confidential computing is promoted by the Confidential Computing Consortium (CCC) industry group, whose membership includes major providers of the technology.[4]
^Fitzgibbons, Laura. "States of Digital Data". Data Management. TechTarget. Retrieved 2023-03-12.
^Schuster, Felix (2022-10-03). "Constellation: The First Confidential Kubernetes Distribution". The New Stack. Retrieved 2023-03-12.
^ abAkram, Ayaz; Akella, Venkatesh; Peisert, Sean; Lowe-Power, Jason (26–27 September 2022). "SoK: Limitations of Confidential Computing via TEEs for High-Performance Compute Systems". 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). IEEE. pp. 121–132. doi:10.1109/SEED55351.2022.00018. ISBN 978-1-6654-8526-5. S2CID 253271359.
^Rashid, Fahmida Y. (June 2020). "The rise of confidential computing: Big tech companies are adopting a new security model to protect data while it's in use". IEEE Spectrum. 57 (6): 8–9. doi:10.1109/MSPEC.2020.9099920. ISSN 1939-9340. S2CID 219767651.
and 25 Related for: Confidential computing information
Confidentialcomputing is a security and privacy-enhancing computational technique focused on protecting data in use. Confidentialcomputing can be used...
specialized meaning that is distinct from the field of confidentialcomputing. With Trusted Computing, the computer will consistently behave in expected ways...
" In September 2020, the Linux Foundation released a free serverless computing training course with CNCF. It is taught by Alex Ellis, founder of OpenFaaS...
Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic...
Domain Extensions" (PDF). February 2022. "How Google and Intel make ConfidentialComputing more secure". 24 April 2023. Retrieved 20 September 2023. Cheng...
(2022-01-20). "Rising to the Challenge — Data Security with Intel ConfidentialComputing". community.intel.com. Retrieved 2022-04-20. Intel Architecture...
can be computed equally efficiently with neuromorphic quantum computing. Both, traditional quantum computing and neuromorphic quantum computing are physics-based...
Retrieved 8 June 2022. "Latest SUSE Linux Enterprise goes all in with confidentialcomputing". 20 June 2023. Vugt, Sander van (February 2007). The Definitive...
Retrieved 26 July 2018. "Latest SUSE Linux Enterprise goes all in with confidentialcomputing". 20 June 2023. "Product Support Lifecycle | SUSE". www.suse.com...
Ampere Computing LLC is an American fabless semiconductor company based in Santa Clara, California that develops processors for servers operating in large...
infrastructure of cloud computing. It is a sub-domain of computer security, network security, and, more broadly, information security. Cloud computing and storage...
networking, reputation systems in wireless ad hoc networks, and confidentialcomputing. Educated in Austria and Switzerland, she has worked in the US,...
support virtualization host extensions, nested virtualization, and confidentialcomputing. He was also the first to introduce virtual machines and virtual...
Bytecode Alliance Cloud Native Computing Foundation CodePlex Foundation, later known as Outercurve Foundation ConfidentialComputing Consortium eBPF Foundation...
advanced persistent threats. In order to ensure adequate security, the confidentiality, integrity and availability of a network, better known as the CIA triad...
simultaneously. Quantum computing has been found to achieve computing speeds thousands of times faster than today's supercomputers. This computing power presents...
engaged in the development of quantum computing, quantum communication and quantum sensing. Quantum computing and communication are two sub-fields of...
loaded inside it to be protected with respect to confidentiality and integrity. Data confidentiality prevents unauthorized entities from outside the TEE...
In computing, a secure environment is any system which implements the controlled storage and use of information. In the event of computing data loss,...
mid-trial settlement was agreed in April 2018. Novena (computing platform) OpenBMC Open-source computing hardware OpenPOWER Foundation Telecom Infra Project –...