同步操作将从 百度开源/incubator-Teaclave 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
MesaTEE is the next-gen solution to enable general computing service for security-critical scenarios. It will allow even the most sensitive data to be securely processed to enable offshore businesses without leakage.
The solution combines the advanced Hybrid Memory Safety (HMS) model and the power of the Trusted Computing technologies (e.g. TPM) as well as the Confidential Computing technologies (e.g. Intel® SGX).
The emerging technologies of big data analytics, machine learning, cloud/edge computing, and blockchain are significantly boosting our productivity, but at the same time they are bringing new confidentiality and integrity concerns. On public cloud and blockchain, sensitive data like health and financial records may be consumed at runtime by untrusted computing processes running on compromised platforms; during inhouse data exchange, confidential information may cross different clearance boundaries and possibly fall into the wrong hands; also not to mention the privacy issue arises in offshore data supply chains.
Although the consequences of data breaching have been extensively elaborated, we should also note that proprietary computing algorithms themselves, such as AI models, also need to be well protected. Once leaked, attackers can steal the intellectual properties, or launch whitebox attacks and easily exploit the weakness of the models.
Facing all these risky scenarios, we are in desperate need of a trusted and secure mechanism, enabling us to protect both private data and proprietary computing models during a migratable execution in potentially unsafe environments, yet preserving functionalities, performance, compatibility, and flexibility. MesaTEE is targeting to be, as we call it, the full “Universal Secure Computing” stack, so it can help users resolve these runtime security risks.
Figure 1: MesaTEE stack redefines future AI and big data analytics by providing a trusted and secure offshore computing environment. The confidentiality and integrity of both data and code can be well protected even if clients and service/platform providers do not trust each other.
As illustrated in the Figure 1, the confidentiality and privacy of data and models can be well protected with MesaTEE, even if data and model originate from different parties with no mutual trust. Moreover, the computing platform itself is not necessarily trusted either. The Trusted Computing Base (TCB) can thus be largely reduced to MesaTEE framework alone.
More details can be found in the following documents:
The open-source version of MesaTEE is a prototype. The code is constantly evolving and designed to demonstrate types of functionality.
We still have lots of working-in-progress tasks. We are very happy if you are interested to submit pull requests. Please refer to Issues to help out or report new bugs/suggestions.
Please adhere to the Rust Development Guideline and remember to make format
before submitting PRs.
We encourage you to discuss open source related matters in Issues. For other questions, you may reach out to MesaTEE mailing list: developers@mesatee.org or each maintainer individually.
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。