Skip to content

openanolis/confidential-ai

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

46 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Confidential AI

The Confidential AI open-source project enables developers to securely execute sensitive AI tasks in the cloud: without exposing raw data/models, it leverages trusted hardware and remote attestation technologies to protect user privacy data, training sets, and generative models throughout their lifecycle while allowing normal utilization of cloud computing resources for complex AI inference and training.


目录


Components

Current Stable Version: v1.0.0 - 2025-06-01 Core Update: First release of Confidential AI

Component Version Function Description Change Summary
Trustiflux 1.1.0 Integrates CDH/AA to provide resource security management and remote attestation services for confidential computing containers Added AA/CDH dracut module support
Architecture restructured: RACR protocol migrated to CDH
Security enhancements: Integrated TPM attestation module
Trustee 1.1.3 Tools and components for verifying confidential computing TEE (Trust Execution Environment) and secret data delivery Integrated TPM private key CA plugin
Added authentication policy query API
TNG 1.0.3 Trusted gateway based on remote attestation, enabling end-to-end encrypted communication for zero-trust architecture without application modifications -

Full Change Log


Features


Deployment

Docker Deployment:

  1. For rapid validation of Confidential-AI's end-to-end workflow, we provide a one-click Docker-based deployment solution. See Docker Deployment Guide. This solution applies to:
  • Hybrid environment simulation: Process covers user side (Trustee key management) and cloud side (Trustiflux trusted inference) collaboration. Full simulation can be completed in a single TDX instance through Docker, suitable for development debugging or demonstration verification.
  • Out-of-the-box: Containerized packaging of dependency environments and configuration scripts avoids deployment issues caused by environment differences, ensuring process consistency.
  1. Core Requirements
  • Confidential computing environment supporting SGX (e.g., Alibaba Cloud TDX ECS).
  • Docker and basic command-line tools installed.
  1. Key Advantages
  • Security enhancement: Combines SGX remote attestation technology to ensure keys are decrypted only in verified trusted environments, protecting model privacy.
  • Agile delivery: Pre-configured automation scripts handle complex steps like PCCS configuration and service discovery, reducing onboarding costs.
  • Environment agnosticism: Container images can be rapidly migrated across any cloud environment supporting SGX, adapting to multi-cloud/hybrid cloud architectures.

RPM Deployment:

  1. Production-grade deployment solution based on RPM packages. For details, see RPM Deployment Guide. Applicable to the following scenarios:
  • Production Environment Deployment: Version control and dependency management through standard package managers.
  • Hardware-Dedicated Environments: Deploy directly on TDX-supported physical or virtual machines for optimal performance.
  1. Core Requirements
  • TDX-supported confidential computing environment (e.g., Alibaba Cloud TDX ECS).
  • Operating system: Alibaba Cloud Linux 3 (AL3).
  1. Key Advantages
  • Standard Package Management: Install/upgrade/uninstall via RPM packages, compliant with enterprise operation standards.
  • Automated Workflows: Preconfigured scripts automatically handle complex processes like key management and service registration.
  • Flexible Extensibility: Support for custom configuration parameters by modifying config_trustee.yaml and config_trustiflux.yaml to adjust deployment strategies.

License

Apache 2.0 License

This project uses the Apache 2.0 license.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 5