Shielding Network Function on a Multi-Operator System using SGX
FINSE May 9, 2018
Enio Marku Joint work with Gergely Biczok
Shielding Network Function on a Multi-Operator System using SGX - - PowerPoint PPT Presentation
Shielding Network Function on a Multi-Operator System using SGX FINSE May 9, 2018 Enio Marku Joint work with Gergely Biczok Outline Introduction Motivation Methodology Current work Future work 2 Introduction Phd at
Enio Marku Joint work with Gergely Biczok
2
3
4
5
6
integration of cloud, IoT and machine to machine communication by adding new verticals
technical terms
the multi-actor value chain of 5G services which inevitably require multi
7
8
9
application with combination of virtualization software and industry standard hardware
networking vendors and service providers.
such as reduced capital expenditure (capex), reducing operating expense, increase management efficiencies
networks needed to set up cloud based services and application
software and industry standard hardware
deploy services, or VNF
service chaining, scaling services are the requirements of Orchestration
12
13
encrypted result which, when decrypted, matches the result of the
encrypted data
14
15
attacks can be performed
perform an attack on FHE scheme
performed Reaction Attack over a FHE
16
It seems to fulfill our security requirements to a certain extent
17
18
VAS which is going to be part of the Enclave)
register to be updated)
executable)
Enclave)
Enclave)
21
22
1. The attacker can not observe any information about the protected code and data in the enclave 2. Remote attestation establish a secure connection between correct parties and loads the desired code inside the enclave 1. We have considered an attacker which can compromise the software stack of the operator outside the enclave 2. This kind of model implies, the attacker can observe communication between hardware enclaves as well as communication on the network
23
1. Each NF is trusted only with the permission given to it by the enterprise for specific packet fields 2. For instance if the client give a NAT read/write permission for the IP header, the NF is trusted to not leak the header to unauthorized entities and to modify it correctly
24