{"id":854808,"date":"2022-06-22T09:11:39","date_gmt":"2022-06-22T16:11:39","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&p=854808"},"modified":"2023-02-15T01:10:44","modified_gmt":"2023-02-15T09:10:44","slug":"confidential-containers","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/confidential-containers\/","title":{"rendered":"Confidential Containers"},"content":{"rendered":"
\n\t
\n\t\t
\n\t\t\t\"Cloud\t\t<\/div>\n\t\t\n\t\t
\n\t\t\t\n\t\t\t
\n\t\t\t\t\n\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n

Confidential Containers<\/h1>\n\n\n\n

<\/p>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n

More and more of the world’s cloud computation is containerized, but these containers are not safe. From web servers to machine learning models, containerization empowers users to build functionality that can be effortlessly moved into the cloud. However, once an application moves from internal bare metal to containerization in the cloud many security guarantees are lost. Just as is the case when an intranet website is moved to the public web, new technology is required to ensure that functionality and data are safe and secure. Our aim with the confidential containers research project is to provide users with strong confidentiality and integrity guarantees for their containers so that, as HTTPS was to HTTP, their computation will be safe and secure in the public cloud.<\/p>\n\n\n\n

Smaller Trusted Computing Base (TCB)<\/h3>\n\n\n\n

At present, all publicly hosted containerized compute requires including the Cloud Service Provider (CSP) in the TCB. This means that the operator can potentially compromise the functionality or data being embodied in those containers. One aim of the project is to reduce the size of the TCB to contain only the customer containers and an open-source OS. Many key workflows (computation over pooled user data, financial calculations) cannot currently be hosted in the public cloud due to regulatory or competitive restrictions. With a smaller TCB, customers with these workflows can reduce overall costs, make use of the high-quality software and hardware provided by public clouds, and obtain greatly increase flexibility for variable usage patterns.<\/p>\n\n\n\n

Ease of use<\/h3>\n\n\n\n

Another key goal of the project is to make it as easy as possible to use confidential containers. While there are options currently for secure computation of this kind, it often requires extensive engineering work to rebuild and retarget existing code. In contrast, our approach allows users to deploy their unmodified containerized workload yet gain the full benefits of confidentiality.<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"

More and more of the world’s cloud computation is containerized, but these containers are not safe. From web servers to machine learning models, containerization empowers users to build functionality that can be effortlessly moved into the cloud. However, once an application moves from internal bare metal to containerization in the cloud many security guarantees are […]<\/p>\n","protected":false},"featured_media":663480,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-854808","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[1087692],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Sylvan Clebsch","user_id":36368,"people_section":"Section name 0","alias":"syclebsc"},{"type":"guest","display_name":"Ken Gordon","user_id":854814,"people_section":"Section name 0","alias":""},{"type":"user_nicename","display_name":"Matthew Johnson","user_id":32830,"people_section":"Section name 0","alias":"matjoh"},{"type":"user_nicename","display_name":"Stavros Volos","user_id":35437,"people_section":"Section name 0","alias":"svolos"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/854808"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":4,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/854808\/revisions"}],"predecessor-version":[{"id":919506,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/854808\/revisions\/919506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/663480"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=854808"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=854808"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=854808"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=854808"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=854808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}