Skip to main content

Confidential Computing

Overview

Confidential computing secures data in use by executing computations within a hardware-based trusted execution environment (TEE). The term "confidential computing" is often used interchangeably with "secure enclaves" and "trusted execution environments". The current page outlines the key aspects of confidential computing, its applications, functionalities, and the technologies implemented by leading providers like AWS Nitro Enclaves, Intel TDX, and AMD SEV-SNP. However, given the complexity of the topic, we encourage you to explore the links provided throughout the documentation for a deeper understanding.

What is Confidential Computing?

Confidential computing is a security paradigm designed to protect data while it is being processed. Unlike traditional data protection that focuses on data at rest and in transit, confidential computing specifically secures data in use. A TEE is a secure area of a main processor. It guarantees the protection of code and data loaded inside in terms of confidentiality and integrity. In simple terms, it’s like having a lockbox in the middle of an open room where the contents of the lockbox cannot be seen or altered, even though the box itself is accessible. This approach addresses the vulnerability of data being exposed in memory to unauthorised entities during computation.

Confidential computing is based on three main principles:

To ensure these principles are satisfied, confidential computing uses processors with built-in support for creating secure enclaves. These processors perform cryptographic operations that underpin the security of the TEE. In addition, memory encryption prevents data from being read even if physical access to the server is obtained.

Use Cases

Confidential computing is applied across various sectors to secure critical and sensitive workloads:

1
Financial Services

Secure processing of transactions and sensitive financial data.

2
Healthcare

Management of personal health information with utmost confidentiality.

3
Government and Public Sector

Handling classified or sensitive government data.

4
Multi-party Computation

Enabling collaboration on data analysis among multiple parties without exposing individual datasets.

How Does Confidential Computing Work?

The implementation of confidential computing involves some core components:

Each cloud provider has its own name and architecture to supply confidential computing solutions to its clients. In the following section, you find a brief overview of different options available on the market.

Challenges of Confidential Computing

The additional security provided by confidential computing comes with some costs, particularly in terms of performance and complexity. Encrypting and managing secure enclaves can result in performance overhead. However, with careful implementation and deployment, this performance overhead can be minimised. Furthermore, the establishment and maintenance of secure enclaves entail significant management overhead, including the handling of encryption keys and attestation protocols.

OBLV Deploy Approach

OBLV Deploy uses AWS Nitro Enclaves to build a confidential computing solution that is easier to manage and includes additional services. On the What's OBLV Deploy page, you can find a comparison between the AWS Nitro Enclaves and OBLV Deploy solutions. OBLV Deploy team is working continuously to expand the supported cloud providers, including Microsoft Azure and Google Cloud Platform.

What's Next?