Introduction
Confidential computing is a technology that protects data processing security on trusted hardware. The Arm processors for confidential computing adopt the TrustZone technology.
Trusted execution environments (TEEs) of traditional TrustZone solutions are dedicated to terminal devices. Trusted applications (TAs) can run in the TEE OS only after being authenticated by terminal device vendors, but cannot be used in general-purpose computing. The TEE Kit is a next-generation confidential computing technology implemented in virtual machines (VMs). It is compatible with the existing application ecosystem and extends confidential computing from the application layer to the OS layer. This document describes the software architecture and features of the Confidential Computing TEE Kit powered by a new Kunpeng 920 processor model, and how to set up the TEE Kit environment and use confidential virtual machines (cVMs).
Feature Name |
Feature Description |
Application Scenario |
|---|---|---|
Remote attestation |
Proves the trustworthiness of cVMs and confidential computing platforms to users, including:
|
Confidential cloud hosts and secure database enclaves |
Full-disk encryption (FDE) |
Encrypts the entire disk drive partition to protect sensitive information in cVM images. |
Drive and database encryption |
Sealing key |
Generates a key inside a cVM and binds it to the cVM. The sealing key remains unchanged after the cVM restarts. |
Drive and database encryption |
Confidential device passthrough |
Switches PCIe devices into a confidential computing environment and passes them through to cVMs to protect data-in-transit. |
AI model protection, confidential cloud hosts, and secure database enclaves |
Confidential containers |
Protects containers from end to end by leveraging core capabilities of cVMs and basic functions provided by the Kata/Coco community, such as encryption, decryption, signature verification, and remote attestation. |
AI model protection, serverless, and PaaS |
Secure memory encryption |
Implements transparent memory-encryption protection for TEEs based on the hardware root key. |
Prevention of near-end attacks |
SM acceleration |
Enhances SM algorithm performance and enables algorithm offload through the KAE in cVMs. |
Secure database enclaves and cryptographic computing |
DPDK-OSV network acceleration |
Attaches vhost-user devices to cVMs to enable network acceleration. |
Encrypted cloud hosts |
Cloud management platforms |
Manages cVMs on the OpenStack cloud platform, enabling access to compute, storage, and network virtualization services. |
Encrypted cloud hosts |
Live VM migration |
Live migrates cVMs across nodes when device passthrough is not used. |
Encrypted cloud hosts |