-
Notifications
You must be signed in to change notification settings - Fork 204
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fixup! Updating the documentation so it is consistent with my changes…
… and the updates from the team. Changes corresponding to comments from Dmitrii. Signed-off-by: Benny Fuhry <benny.fuhry@intel.com>
- Loading branch information
Showing
21 changed files
with
234 additions
and
137 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,35 +1,51 @@ | ||
Users of Gramine | ||
================ | ||
|
||
We are excited to share that several companies are experimenting with Gramine for their confidential computing solutions. Please reach out to us at maintainers@gramineproject.io if you are using Gramine and would like to be highlighted on our page. We are looking forward to collaborating with you and continue to enhance Gramine to meet the needs of your confidential computing use cases. We will be updating this list regularly (the list is sorted alphabetically). | ||
We are excited to share that several companies are experimenting with Gramine | ||
for their confidential computing solutions. Please reach out to us at | ||
maintainers@gramineproject.io if you are using Gramine and would like to be | ||
highlighted on our page. We are looking forward to collaborating with you and | ||
continue to enhance Gramine to meet the needs of your confidential computing use | ||
cases. We will be updating this list regularly (the list is sorted | ||
alphabetically). | ||
|
||
- `Eder Labs <https://www.eder.io>`__ started its journey with the belief that businesses worldwide should easily be able to adopt ML/AI, without the concerns around compromising sensitive enterprise or consumer data. Towards this future, Eder Labs has begun facilitating exploratory data science between data users and data providers, for structured text data, and will be using the Gramine LibOS to facilitate training and deployment of models in a secure and federated manner, as the data science journey matures for these businesses. The Gramine ecosystem is laying the path to a more secure future, for all kinds of ML/AI applications, and Eder Labs is a firm supporter and beneficiary of this future-defining paradigm. | ||
- `Eder Labs <https://www.eder.io>`__ started its journey with the belief that | ||
businesses worldwide should easily be able to adopt ML/AI, without the | ||
concerns around compromising sensitive enterprise or consumer data. Towards | ||
this future, Eder Labs has begun facilitating exploratory data science between | ||
data users and data providers, for structured text data, and will be using the | ||
Gramine LibOS to facilitate training and deployment of models in a secure and | ||
federated manner, as the data science journey matures for these businesses. | ||
The Gramine ecosystem is laying the path to a more secure future, for all | ||
kinds of ML/AI applications, and Eder Labs is a firm supporter and beneficiary | ||
of this future-defining paradigm. | ||
|
||
- `enclaive.io <https://enclaive.io>`__ uses among other technologies Gramine to generically enclavize applications. Enclaive builds and deploys confidential | ||
containers for the zero-trust Web. Use cases are in the area of GDPR-compliant | ||
Web analytics and AI. Specifically, Gramine Shielded Containers (GSC) ease the | ||
design of confidential containers. | ||
- `enclaive.io <https://enclaive.io>`__ uses among other technologies Gramine to | ||
generically enclavize applications. Enclaive builds and deploys confidential | ||
containers for the zero-trust Web. Use cases are in the area of GDPR-compliant | ||
Web analytics and AI. Specifically, Gramine Shielded Containers (GSC) ease the | ||
design of confidential containers. | ||
|
||
- `JD Cloud <https://www.jdcloud.com/>`__ is experimenting with Gramine for | ||
several solutions. | ||
- `JD Cloud <https://www.jdcloud.com/>`__ is experimenting with Gramine for | ||
several solutions. | ||
|
||
- `Super Protocol <https://www.superprotocol.com/>`__ combines the benefits of | ||
both Trusted Execution Environment (TEE) technology and blockchain to offer a | ||
universal, decentralized, confidential cloud computing platform. It enables | ||
easy deployment of a wide range of workloads - a rich ecosystem of | ||
interoperable solutions and services, including databases, web services, | ||
confidential data sources, and much more. Super Protocol takes advantage of | ||
the open-source Gramine library OS, which works in conjunction with Intel SGX | ||
to provide additional security benefits in Linux environments. | ||
- `Super Protocol <https://www.superprotocol.com/>`__ combines the benefits of | ||
both Trusted Execution Environment (TEE) technology and blockchain to offer a | ||
universal, decentralized, confidential cloud computing platform. It enables | ||
easy deployment of a wide range of workloads - a rich ecosystem of | ||
interoperable solutions and services, including databases, web services, | ||
confidential data sources, and much more. Super Protocol takes advantage of | ||
the open-source Gramine library OS, which works in conjunction with Intel SGX | ||
to provide additional security benefits in Linux environments. | ||
|
||
- `Tencent Cloud <https://intl.cloud.tencent.com/>`__ relies on Gramine to | ||
implement several SGX-based solutions by running unmodified Linux | ||
applications. One example is the recent launch of the Tencent Cloud | ||
Shuliantong product, announced at the Tencent Digital Ecosystem Summit. | ||
- `Tencent Cloud <https://intl.cloud.tencent.com/>`__ relies on Gramine to | ||
implement several SGX-based solutions by running unmodified Linux | ||
applications. One example is the recent launch of the Tencent Cloud | ||
Shuliantong product, announced at the Tencent Digital Ecosystem Summit. | ||
|
||
- The national digital health agency `gematik <https://www.gematik.de/>`__ is | ||
responsible for the *ePrescription* project in Germany. `IBM | ||
<https://www.ibm.com/>`__ uses Gramine to implement the "VAU"-concept on SGX | ||
to ensure a maximum of privacy and request-context isolation. The VAU-concept | ||
is used for confidential computing in different implementations as well, such | ||
as the electronic health record. | ||
- The national digital health agency `gematik <https://www.gematik.de/>`__ is | ||
responsible for the *ePrescription* project in Germany. `IBM | ||
<https://www.ibm.com/>`__ uses Gramine to implement the "VAU"-concept on SGX | ||
to ensure a maximum of privacy and request-context isolation. The VAU-concept | ||
is used for confidential computing in different implementations as well, such | ||
as the electronic health record. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,14 +1,20 @@ | ||
Gramine Shielded Containers | ||
=========================== | ||
|
||
The Gramine Shielded Container (GSC) tool transforms an original Docker image into a new, "graminized" image | ||
which includes the Gramine Library OS, manifest files, and Intel SGX related information. It uses Gramine to execute the application inside an Intel SGX enclave. It follows the common Docker approach to first build an image and subsequently run this image inside a container. | ||
The Gramine Shielded Container (GSC) tool transforms an original Docker image | ||
into a new, "graminized" image which includes the Gramine Library OS, manifest | ||
files, and Intel SGX related information. | ||
It uses Gramine to execute the application inside an Intel SGX enclave. | ||
It follows the common Docker approach to first build an image and subsequently | ||
run this image inside a container. | ||
|
||
At first a Docker image has to be graminized via the ``gsc build`` command. When the graminized image is | ||
run within an Intel SGX enclave, the image must be signed via a ``gsc sign-image`` command. Subsequently, the image can be run using ``docker run``. | ||
At first a Docker image has to be graminized via the ``gsc build`` command. | ||
When the graminized image is run within an Intel SGX enclave, the image must be | ||
signed via a ``gsc sign-image`` command. | ||
Subsequently, the image can be run using ``docker run``. | ||
|
||
Note the GSC documentation is split from the core Gramine documentation | ||
and is hosted here: https://gramine.readthedocs.io/projects/gsc. | ||
|
||
Similarly, the GSC tool is split from the core Gramine repository and can be | ||
found here: https://github.com/gramineproject/gsc. | ||
found here: https://github.com/gramineproject/gsc. |
Binary file not shown.
Oops, something went wrong.