Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Agenda Request - On premise trusted servers #122

Closed
vminet opened this issue May 29, 2023 · 5 comments
Closed

Agenda Request - On premise trusted servers #122

vminet opened this issue May 29, 2023 · 5 comments
Assignees
Labels
agenda+ Request to add this issue to the agenda of our next telcon or F2F

Comments

@vminet
Copy link
Contributor

vminet commented May 29, 2023

Agenda+: On premise trusted servers

Criteo would like to discuss the option of running trusted server on-premise in an adtech own infrastructure.
The current draft mandates that services running in a TEE should be deployed on a cloud platform.
We would like to understand why ?

Being required to operate on a cloud platform is likely to increase an adtech’s costs significantly.
Considering the security guarantees offered by TEE, this requirement is a little odd.
For example, remote attestation would work just as well from an adtech own infrastructure.

Unless there is a fear that side-channel attacks could be too easily exploited in the wild ?
The fact that the cloud platform is a trusted entity in the current draft is maybe a hint of that ?
In that case, what security features an infrastructure would need to provide to be allowed to host TEE and what TEE implementation would be allowed ?

Time

30 minutes to 1 hour

Links

https://github.com/privacysandbox/fledge-docs/blob/main/trusted_services_overview.md

@vminet vminet added the agenda+ Request to add this issue to the agenda of our next telcon or F2F label May 29, 2023
@ekr
Copy link
Contributor

ekr commented May 29, 2023

Unless there is a fear that side-channel attacks could be too easily exploited in the wild ?

This is precisely the concern. In this scenario the adtech is the attacker, and so physical possession of the device is a serious risk.

@jalbertoroman
Copy link

Could Amazon, Microsoft or Google be considered hosting on-prem servers running in their cloud?

@ekr
Copy link
Contributor

ekr commented May 30, 2023

I don't think I understand the question, but my view is that if (say) Amazon is the advertiser and they run a server with a TEE in AWS, then this is not a very strong defense against cheating by Amazon.

By contrast if it's in Google's cloud, and Google promises not to collude with Amazon, then you have a somewhat higher level of guarantee against physical attack. How much is, I think, dependent on a lot of details not fleshed out in this discussion.

@jwrosewell
Copy link

Requiring the use of a specific business model must not be the business of standards making.

@jalbertoroman
Copy link

jalbertoroman commented Jun 22, 2023

It is prety clear that AWS, Azure and GC are on-prem servers for their respective companies. And at the same time they are 3 of the largests adversitsers. TEE has a history of secury flaws. On top of that secure enclaves decrypt the information to process it. So each cloud and company will be procesing PII. As an expert in Privacy Enhancing Technologies and GDPR regulation I don't think TEE provide the level of secury and anonymization European regulators are looking for. And all of this is desinged to comply with regulations not only with the demise of third party cookies.

@AramZS AramZS closed this as completed Jul 10, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
agenda+ Request to add this issue to the agenda of our next telcon or F2F
Projects
None yet
Development

No branches or pull requests

6 participants