[Confidential Computing - What Big Factory Says] Alibaba Cloud

Let's take a look at how Alibaba Cloud ECS uses confidential computing, and the block quotes are interpreted by bloggers;

I. Introduction

        This article describes how to use the Alibaba Cloud Virtualization Enclave to create a trusted isolation space to protect the security of your applications and data.

The Alibaba Cloud solution is implemented based on virtualized Enclave, that is, through virtual machine technology

2. Background information

        Data is generally divided into three forms: static data, data in transit, and data in use. The former two can protect data security through encryption and other methods; however, it is very difficult to guarantee the security of data in use. At present, confidential computing (Confidential Computing) is generally used to protect the security of data in use.

        Alibaba Cloud virtualized enclave provides a trusted isolation space inside the ECS instance, and encapsulates the safe operation of legal software in an enclave to ensure the confidentiality and integrity of your code and data, and is free from malware attacks.

It shows that  the Aliyun virtualized Enclave is being invited to be tested. You can submit a work order to apply for it.

        Alibaba Cloud's virtualized enclave is suitable for businesses that require strong protection of sensitive and confidential data, such as financial services, the Internet, and medical care.

Alibaba Cloud's confidential computing environment is still in testing~

3. The working principle of Enclave

        use

Supongo que te gusta

Origin blog.csdn.net/BillyThe/article/details/131852482
Recomendado
Clasificación