The Current Situation and Trends of Trusted Execution Environment Applications
Download PDF
$currentUrl="http://$_SERVER[HTTP_HOST]$_SERVER[REQUEST_URI]"

Keywords

Trusted execution environment
Privacy protection
Data security
Cloud computing

DOI

10.26689/pbes.v8i2.10296

Submitted : 2025-03-30
Accepted : 2025-04-14
Published : 2025-04-29

Abstract

With the rapid development of digital technologies such as big data, cloud computing, and the Internet of Things (IoT), data security and privacy protection have become the core challenges facing modern computing systems. Traditional security mechanisms are difficult to effectively deal with advanced adversarial attacks due to their reliance on a centralized trust model. In this context, the Trusted Execution Environment (TEE), as a hardware-enabled secure isolation technology, offers a potential solution to protect sensitive computations and data. This paper systematically discusses TEE’s technical principle, application status, and future development trend. First, the underlying architecture of TEE and its core characteristics, including isolation, integrity, and confidentiality, are analyzed. Secondly, practical application cases of TEE in fields such as finance, the IoT, artificial intelligence, and privacy computing are studied. Finally, the future development direction of TEE is prospected.

References

Stergiou C, Bompoli E, Psannis K, 2023, Security and Privacy Issues in IoT-Based Big Data Cloud Systems in a Digital Twin Scenario. Applied Sciences, 13(2): 758. https://doi.org/10.3390/app13020758

Witharana H, Weerasena H, Mishra P, 2024, Formal Verification of Virtualization-Based Trusted Execution Environments. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 43: 4262–4273.

Liu Z, Hu C, Li R, et al., 2023, A Privacy-Preserving Outsourcing Computing Scheme Based on Secure Trusted Environment. IEEE Transactions on Cloud Computing, 11: 2325–2336.

Valadares D, Sobrinho D, Perkusich A, et al., 2021, Formal Verification of a Trusted Execution Environment-Based Architecture for IoT Applications. IEEE Internet of Things Journal, 8(23): 17199–17210.

Kuniyasu S, 2020 Implementation of Trusted Execution Environment and Its Supporting Technologies, IEICE ESS Fundamentals Review, 14(2): 107–117.

Xia J, Pan D, Pan Y, et al., 2022, User-level Enclave Protection Scheme based on ARM TrustZone. In International Conference on Frontiers of Electronics, Information and Computation Technologies (ICFEICT 2021). Association for Computing Machinery, New York, NY, USA, 138: 1–6. https://doi.org/10.1145/3474198.3478243

Witharana H, Chatterjee D, Mishra P, 2024, Verifying Memory Confidentiality and Integrity of Intel TDX Trusted Execution Environments. 2024 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 44–54.

Yi H, 2024, Anti-Money Laundering (AML) Information Technology Strategies in Cross-Border Payment Systems. Law and Economy, 12(1): 55–70.

Li Z, He S, Chaturvedi P, et al., 2024, Secure Federated Learning Across Heterogeneous Cloud and High-Performance Computing Resources — A Case Study on Federated Fine-tuning of LLaMA 2. Computing in Science & Engineering, 26(2): 120–130.

Reddy K, Chadha A, Nikhil P, et al., 2024, Hybrid Cryptography Techniques for Data Security in Cloud Computing. 2024 IEEE International Conference on Computing, Power and Communication Technologies (IC2PCT), 5: 1836–1842.

Segarra C, Delgado G, Schiavoni V, 2020, MQT-TZ: Hardening IoT brokers using ARM TrustZone: (Practical experience report). 2020 International Symposium on Reliable Distributed Systems (SRDS), 256–265.

Jiang W, Li E, Zhou W, et al., 2023, IoT Access Control Model Based on Blockchain and Trusted Execution Environment. Processes, 11(4): 813–822.

Lew C, Torres C, Shinde S, et al., 2024, Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains. 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 217–224.

He J, Cao D, Zhou Y, 2022, TrustAuction: A TEE based Privacy Protection Framework for Auction Contracts. 2022 IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion (QRS-C), 766–767.

D’Antonio, S, Giglio J, Mazzeo G, et al., 2024, Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation. 2024 IEEE International Conference on Cyber Security and Resilience (CSR), 676–681.