Miti Mazmudar 7a4fc8c168 Included text on the deploy_enclaves script. | 4 vuotta sitten | |
---|---|---|
docker | 4 vuotta sitten | |
graphene-docker | 4 vuotta sitten | |
sgx-docker | 4 vuotta sitten | |
LICENSE.txt | 4 vuotta sitten | |
README.md | 4 vuotta sitten | |
build-driver | 4 vuotta sitten | |
build-mitigator | 5 vuotta sitten | |
install-driver | 5 vuotta sitten | |
run-mitigator | 4 vuotta sitten |
This repository contains Docker files for reproducing the implementation of the server-side code for the following paper:
Miti Mazmudar, Ian Goldberg. "Mitigator: Privacy policy compliance using trusted hardware" Proceedings on Privacy Enhancing Technologies. Vol. 2020, No. 3. 18 pages. July 2020.
This system requires a machine with Intel Software Guard Extension (SGX) to function correctly. It consists of three enclaves: a decryptor, a verifier and a target enclave. The Linux SGX driver and Linux SGX SDK are required to run the decryptor enclave. The Linux SGX SDK is also required for the enclaves to attest to each other and to seal secrets to disk. We use the Graphene-SGX library to support running a proof-of-concept verifier and the target application. The target application is an Apache server with a PHP extension to interface with the decryptor enclave. The Graphene-SGX driver is also required to run any applications within Graphene.
We have four main scripts. Two of these scripts setup drivers and the others setup, launch a docker container for running the three enclaves.
After entering the docker container, the deploy_enclaves script creates the three enclaves, starting with the decryptor, followed by the verifier and then the Apache server, each in a different tmux session. We do require a client to install our browser extension to test our server-side setup.