Research & Development World

  • Home Page
  • Topics
    • Aerospace
    • Archeology
    • Automotive
    • Biotech
    • Chemistry
    • COVID-19
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Market Pulse
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
      • Software
    • Semiconductors
  • 2021 R&D 100 Award Winners
    • R&D 100 Awards
    • 2020 Winners
    • Winner Archive
  • Resources
    • Digital Issues
    • Podcasts
    • Subscribe
  • Global Funding Forecast
  • Webinars

Researchers Develop Technique that Offers Enhanced Security for Sensitive Data In Cloud Computing

By R&D Editors | October 18, 2011

Researchers Develop Technique that Offers Enhanced Security for Sensitive Data In Cloud Computing

Researchers Develop Technique that Offers Enhanced Security for Sensitive Data In Cloud Computing
The research team, led by Peng Ning, has developed a new approach to cloud security, to protect sensitive information and workload.

Researchers from North Carolina State University and IBM have developed a new, experimental technique to better protect sensitive information in cloud computing — without significantly affecting the system’s overall performance.

Under the cloud-computing paradigm, the computational power and storage of multiple computers is pooled, and can be shared by multiple users. Hypervisors are programs that create the virtual workspace that allows different operating systems to run in isolation from one another — even though each of these systems is using computing power and storage capability on the same computer. A longstanding concern in cloud computing is that attackers could take advantage of vulnerabilities in a hypervisor to steal or corrupt confidential data from other users in the cloud.

The NC State research team has developed a new approach to cloud security, which builds upon existing hardware and firmware functionality to isolate sensitive information and workload from the rest of the functions performed by a hypervisor. The new technique, called “Strongly Isolated Computing Environment” (SICE), demonstrates the introduction of a different layer of protection.

“We have significantly reduced the ‘surface’ that can be attacked by malicious software,” says Dr. Peng Ning, a professor of computer science at NC State and co-author of a paper describing the research. “For example, our approach relies on a software foundation called the Trusted Computing Base, or TCB, that has approximately 300 lines of code, meaning that only these 300 lines of code need to be trusted in order to ensure the isolation offered by our approach. Previous techniques have exposed thousands of lines of code to potential attacks. We have a smaller attack surface to protect.”

SICE also lets programmers dedicate specific cores on widely-available multi-core processors to the sensitive workload — allowing the other cores to perform all other functions normally. A core is the brain of a computer chip, and many computers now use chips that have between two and eight cores. By confining the sensitive workload to one or a few cores with strong isolation, and allowing other functions to operate separately, SICE is able to provide both high assurance for the sensitive workload and efficient resource sharing in a cloud.

In testing, the SICE framework generally took up approximately 3 percent of the system’s performance overhead on multi-core processors for workloads that do not require direct network access. “That is a fairly modest price to pay for the enhanced security,” Ning says. “However, more research is needed to further speed up the workloads that require interactions with the network.”

The paper, “SICE: A Hardware-Level Strongly Isolated Computing Environment for x86 Multi-core Platforms,” was co-authored by Ning; NC State Ph.D. student Ahmed Azab; and Dr. Xiaolan Zhang of IBM’s T.J. Watson Research Center. The paper will be presented at the 18th ACM Conference on Computer and Communications Security, Oct. 17-21 in Chicago, Ill. The research was funded by the National Science Foundation, U.S. Army Research Office and IBM.

NC State’s computer science department is part of the university’s College of Engineering.

Related Articles Read More >

ENPICOM launches display solution to accelerate antibody selection while maximizing precision
Groundbreaking research could help paramedics save the lives of pedestrian casualties 
R&D 100 winner of the day: Slycat
R&D 100 winner of the day: dGen
2021 R&D Global Funding Forecast

Need R&D World news in a minute?

We Deliver!
R&D World Enewsletters get you caught up on all the mission critical news you need in research and development. Sign up today.
Enews Signup

R&D World Digital Issues

February 2020 issue

Browse the most current issue of R&D World and back issues in an easy to use high quality format. Clip, share and download with the leading R& magazine today.

Research & Development World
  • Subscribe to R&D World Magazine
  • Enews Sign Up
  • Contact Us
  • About Us
  • Drug Discovery & Development
  • Pharmaceutical Processing
  • 2021 Global Funding Forecast

Copyright © 2022 WTWH Media LLC. All Rights Reserved. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media
Privacy Policy | Advertising | About Us

Search R&D World

  • Home Page
  • Topics
    • Aerospace
    • Archeology
    • Automotive
    • Biotech
    • Chemistry
    • COVID-19
    • Environment
    • Energy
    • Life Science
    • Material Science
    • R&D Market Pulse
    • R&D Management
    • Physics
  • Technology
    • 3D Printing
    • A.I./Robotics
    • Battery Technology
    • Controlled Environments
      • Cleanrooms
      • Graphene
      • Lasers
      • Regulations/Standards
      • Sensors
    • Imaging
    • Nanotechnology
    • Scientific Computing
      • Big Data
      • HPC/Supercomputing
      • Informatics
      • Security
      • Software
    • Semiconductors
  • 2021 R&D 100 Award Winners
    • R&D 100 Awards
    • 2020 Winners
    • Winner Archive
  • Resources
    • Digital Issues
    • Podcasts
    • Subscribe
  • Global Funding Forecast
  • Webinars