Creative Commons Attribution 4.0 International license
Our objective is to protect the code, data, and keys of applications against all users with access to the computer systems. In some domains (e.g., healthcare domain), this must be guaranteed, even if the application is not entirely correct. To simplify the adoption of confidential computing, SCONE transforms cloud-native applications into confidential cloud-native applications running on vanilla Kubernetes clusters. The applications can run on Intel SGX, Intel TDX, and AMD SEV. In the near future, SCONE will also support confidential GPUs. The confidentiality, integrity, and consistency of an application’s data and keys are guaranteed by always keeping the data encrypted, i.e., at rest, in transit, and in use. This enables us to add a protection layer around applications to prevent data loss caused be bugs and backdoors in the application code.
@InProceedings{fetzer:LIPIcs.OPODIS.2025.1,
author = {Fetzer, Christof},
title = {{SCONE Confidential Computing Environment: Protecting Applications Against Powerful Adversaries}},
booktitle = {29th International Conference on Principles of Distributed Systems (OPODIS 2025)},
pages = {1:1--1:1},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-95977-409-3},
ISSN = {1868-8969},
year = {2026},
volume = {361},
editor = {Arusoaie, Andrei and Onica, Emanuel and Spear, Michael and Tucci-Piergiovanni, Sara},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.OPODIS.2025.1},
URN = {urn:nbn:de:0030-drops-251743},
doi = {10.4230/LIPIcs.OPODIS.2025.1},
annote = {Keywords: trusted execution environments, security}
}