SOLUTION BRIEF: SECURE CLOUD INTEGRATION

featuring EmSPARK™
Secure Cloud Integration with EmSPARK™ Security Suite
INTRODUCTION
Device integration with cloud platforms, such as AWS IoT Core or Microsoft Azure IoT, creates a variety of exciting opportunities for any IoT application. Cloud platforms enable management and monitoring of devices at a large scale. Integration with purpose-built analytics applications that can be used to optimize the performance of a fleet of devices, becomes practical. Additionally, today’s applications processors can deliver a rich array of data regarding the health and security state of an IoT device. This data can be used to identify and address threats. To take advantage of this capability, it is critical to create a mutually authenticated, secure connection between the device and the cloud platform.
To establish a mutually authenticated connection, the device and the cloud platform employ the following assets:
- Device Key Pair. This key pair—created during device provisioning—consists of a public key used for authentication, and a private key housed in the secure Trusted Execution Environment (TEE). SecEdge’s Trusted Execution Environment is called CoreTEE™.
- Device Certificate. During device provisioning, a Certificate Signing Request (CSR) is generated in order to produce a certificate signed by the device vendor’s certificate authority.
- Cloud Certificate. The certificate authority of the cloud platform is loaded to the certificate repository managed in the secure TEE
Using these assets, mutual authentication can be achieved using the following steps, using Transport Layer Security (TLS):
- The device validates the cloud’s certificate, using its list of certificate authorities, which is stored securely in the device’s Trusted Execution Environment (TEE).
- The device certificate is presented to the cloud server.
- The cloud server authenticates the device certificate by checking it against its list of registered device certificates.
- The cloud server issues a challenge to the device.
- The device responds by signing the challenge with its private key. This challenge can then be verified by the cloud server.
The EmSPARK™ Security Suite provides a Transport-Level Security (TLS) API—part of the CoreLockr™ API suite—and a TLS trusted application to perform the steps listed above. In the following example, the TLS trusted application, along with SeqcEdge’s supporting trusted applications (certificate management, crypto, and storage) are housed in the secure environment memory partition.

For fully encrypted data transmission to the cloud, the local application can also be housed in the Trusted Execution Environment (TEE).
EmSPARK™ supports the following functions for secure cloud integration:
- Secure software provisioning during manufacturing, which provides credentials. (For more information, see the Secure Software Provisioning Solutions Brief.)
- Support for a secure memory enclave which houses a trusted execution environment (i.e., SecEdge’s CoreTEE™).
- Trusted applications for certificate management, encryption, and secure storage.
- A dedicated API and trusted application for transport layer security, used for device-to-cloud mutual authentication.
- A software developer’s kit (SDK) which can be used to develop a trusted cloud client application.
This approach is an efficient way to greatly reduces the attack surface and overall risk profile applied to running an AI model on the Lenovo SE70.

...it is critical to create a mutually authenticated, secure connection between the device and the cloud platform.