Skip to main content

architecture of confidential computing in computing aware network
draft-yang-teep-ccican-00

Document Type Replaced Internet-Draft (individual)
Authors Penglin Yang , chenmeiling , Li Su
Last updated 2022-03-03
Replaced by draft-yang-teep-usecase-for-cc-in-network
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text html xml htmlized pdfized bibtex
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-yang-teep-usecase-for-cc-in-network
Telechat date (None)
Responsible AD (None)
Send notices to (None)
This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at:
https://www.ietf.org/archive/id/draft-yang-teep-ccican-00.txt

Abstract

Confidential Computing is the protection of data in use by performing computation in a hardware-based Trusted Execution Environment. Especially in virtualization environments, confidential computing could protect data and applications from access or tampering by hypervisor or other privileged users. In Computing-Aware network, computing resource is an essential element to provide computing services for network users' applications. Introducing confidential computing in Computing-Aware network could mitigate the distrust of computing resource efficiently. This document provides the architecture of confidential computing in Computing-Aware network management plane to provide confidentiality and integrity for applications.

Authors

Penglin Yang
chenmeiling
Li Su

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)