機密虛擬化:雲計算大模型時代的數據安全新範式
宋川,朱運閣
- 出版商: 電子工業
- 出版日期: 2025-08-01
- 定價: $648
- 售價: 8.5 折 $550
- 語言: 簡體中文
- 頁數: 252
- ISBN: 7121511061
- ISBN-13: 9787121511066
-
相關分類:
虛擬化技術 Virtualization
立即出貨
買這商品的人也買了...
-
深入淺出聯邦學習:原理與實踐$474$450 -
圖解資料結構 -- 使用 JavaScript$580$452 -
圖說演算法 -- 使用 JavaScript$520$406 -
$555聯邦學習原理與應用 -
量子機器學習及區塊鏈技術導論$474$450 -
$6115G + AI 融合全景圖 -
圖解區塊鏈的工作原理與機制$480$379 -
AWS 職場實戰手冊 - 企業架站、安全防護、費用監控,用最省錢的方式紮實學會!$620$489 -
文科生也學得會!資料 科學 ✕ 機器學習實戰 探索 - 使用 Excel$550$495 -
一步到位!Python 程式設計 -- 最強入門教科書, 3/e$630$498 -
$504聯邦學習:算法詳解與系統實現 -
Python 資料科學實戰教本 - 爬蟲、清理、資料庫、視覺化、探索式分析、機器學習建模,數據工程一次搞定!$680$537 -
會動的演算法:61 個演算法動畫+全圖解逐步拆解,人工智慧、資料分析必備$620$489 -
用 iPad 畫出美好的世界:Procreate 快速入門技法$390$308 -
IoT 開發最強雙引擎:Node-RED + App Inventor 2,用視覺化環境打造 IoT 物聯網裝置$650$429 -
$351區塊鏈技術基礎教程:原理、方法及實踐 -
$265區塊鏈:構建信任和價值的新型基礎設施 -
從 AI 到 生成式 AI:40個零程式的實作體驗,培養新世代人工智慧素養$560$476 -
$714量化信息融合理論及在無線傳感器網絡中的應用 -
$300基於區塊鏈的 IoT 項目實踐 — IoT 設備、數據的可信應用 -
$469集成式機器學習算法理論與應用 -
FLAG'S 創客‧自造者工作坊 跟 AI 一起用 Python 設計 AIoT 物聯網美好日常$1,499$1,184 -
區塊鏈技術原理與實踐$354$336 -
聯邦學習技術及應用$474$450 -
無線邊緣智能$474$450
LLM 大語言模型 詳見活動內容 »
-
78折
零基礎玩轉 LLM 應用全攻略:Python × No-Code 實作 AI 開發超簡單(iThome鐵人賽系列書)$690$538 -
79折
大型語言模型應用實戰:從 Prompt Engineering 到 Agentic RAG 與 MCP$790$624 -
78折
大模型時代:從 ChatGPT 一枝獨秀到全面開戰的 AI 賽局$500$390 -
79折
業界實戰親授 - 大型語言模型微調、最佳化、佈署一次到位$980$774 -
79折
深度學習最佳入門與專題實戰:自然語言處理、大型語言模型與強化學習篇$880$695 -
79折
AIGC 大型語言模型 - 個人應用到企業實戰立刻上手$780$616 -
79折
讓 LLM 飛起來的工具使用 - AI Agent MCP 協議開發、標準、應用$790$624 -
79折
AI Agent 手刻首選 - 使用 LangChain 親手實作 LLM 大型商業專案$880$695 -
79折
LLMOps 打造穩定運行的大型語言模型系統 (LLMOps: Managing Large Language Models in Production)$620$489 -
79折
實用 DeepSeek 技術 - 開發真正可用的 LLM 應用程式$880$695 -
78折
AI 程式設計、深度學習與 LLM 入門到精通:PyTorch × GPT × Transformer × LLaMA 實作指南(iThome鐵人賽系列書)$650$507 -
79折
LLM 工程師開發手冊 (LLM Engineer's Handbook: Master the art of engineering large language models from concept to production)$1,250$987 -
79折
AI Agent 智能工作流:設計與自動化全實戰$760$600 -
79折
不再是 ChatBot - 最新 AI Agent 代理建構$880$695 -
79折
最新 AI 開發範式 - Agent 多重智慧體自動產生應用$680$537 -
79折
LangChain 開發手冊 -- OpenAI × LCEL 表達式 × Agent 自動化流程 × RAG 擴展模型知識 × 圖形資料庫 × LangSmith 除錯工具$680$537 -
79折
LLM 提示工程技術|打造兼具藝術與科學的高效應用 (Prompt Engineering for LLMs: The Art and Science of Building Large Language Model-Based Applications)$620$489 -
79折
LLM 語意理解與生成技術完全開發 (Hands-On Large Language Models)$980$774 -
79折
LLM × 網路爬蟲終極實戰:n8n 串接資料爬取 × Qdrant × RAG 打造本機 AI Agent$980$774 -
79折
LangChain 學習手冊|使用 LangChain 與 LangGraph 建構 AI 與 LLM 應用程式 (Learning LangChain: Building AI and LLM Applications with LangChain and LangGraph)$680$537 -
79折
Node.js 與 LLM 原理與實務:AI 應用程式開發$780$616 -
79折
知道你的下一筆訂單 - 使用 LLM$980$774 -
79折
更少 GPU 卻更強 - LLM 輕量化壓縮及加速訓練$980$774 -
79折
AI Agent 自動化流程超 Easy -- 不寫程式 No Code 聰明完成樣樣事$750$592 -
VIP 95折
AI傳媒學:大模型助力傳媒行業應用與創新$588$558
商品描述
伴隨著人類社會對數據隱私保護需求的增長,隱私計算尤其是機密計算已經成為技術領域的焦點。本書重點介紹了機密計算,特別是機密虛擬化的核心概念、實現原理以及實際應用案例。本書分為四篇:基礎概念、架構實現、實踐案例和未來展望。基礎概念篇介紹了雲計算對數據安全與隱私保護的需求,重點討論了隱私計算,尤其是機密計算的基礎概念及技術演進趨勢。架構實現篇則聚焦於機密虛擬化,分析了其出現的背景及典型的技術實現,並以英特爾的TDX技術為例,深入探討其微架構、指令體系、系統軟件實現等內容。實踐案例篇通過剖析具體案例,探討了機密計算在雲業務場景中的應用及其帶來的收益,涵蓋了人工智能、大模型、數據庫等領域。未來展望篇則從技術、生態和規範等角度,展望了機密計算未來發展的方向和機遇。
目錄大綱
目錄
第 1 章 數據安全與隱私保護····························································.3
1.1 數字化發展帶來的機遇·································································.4
1.1.1 數字化的價值·····································································.4
1.1.2 國內數字化發展戰略····························································.5
1.1.3 全球各國數字化發展戰略······················································.6
1.2 數據安全面臨的挑戰····································································.7
1.2.1 數據隱私保護的重要性·························································.7
1.2.2 數據安全的影響··································································.8
1.2.3 數據生命周期的安全····························································.9
1.3 隱私保護技術············································································.11
1.3.1 隱私保護技術基本概念························································.11
1.3.2 隱私保護技術基本分類························································.12
1.3.3 各類技術比較····································································.17
第 2 章 雲計算中的機密計算···························································.19
2.1 雲計算及數據安全需求································································.20
2.1.1 雲部署下的數據安全···························································.20
2.1.2 數據全生命周期保護····························································21
2.2 機密計算技術演進 ·······································································22
2.2.1 機密計算的定義··································································22
2.2.2 發展歷程及現狀··································································23
第二篇 架構實現
第 3 章 機密計算技術·······································································29
3.1 可信執行環境技術產生 ·································································30
3.2 防護域和攻擊模型 ·······································································30
3.3 機密計算和可信執行環境技術縱覽 ··················································31
3.3.1 ARM 架構 ·········································································32
3.3.2 x86 架構············································································36
3.3.3 RISC-V 架構 ······································································42
3.3.4 特性差異···········································································46
3.4 機密虛擬化················································································47
第 4 章 機密虛擬化架構與實現 ························································48
4.1 微架構······················································································49
4.1.1 威脅模型···········································································50
4.1.2 架構設計···········································································51
4.1.3 TCB 構成 ··········································································53
4.1.4 內存保護機制·····································································54
4.2 指令體系 ···················································································54
4.2.1 指令體系···········································································55
4.2.2 元數據管理········································································57
4.2.3 內存管理···········································································60
4.2.4 處理器虛擬化·····································································62
4.2.5 服務型可信域·····································································66
4.2.6 度量與認證·······································································.66
4.3 虛擬化軟件···············································································.68
4.3.1 虛擬化原理·······································································.68
4.3.2 虛擬機軟件的實現······························································.69
4.3.3 虛擬機監控器實現······························································.72
4.4 I/O 設備虛擬化··········································································.77
4.4.1 傳統 I/O 設備 ····································································.77
4.4.2 TEE-I/O 設備 ····································································.79
4.4.3 TEE-I/O 安全模型 ······························································.81
4.4.4 TEE-I/O 設備認證 ······························································.84
第 5 章 高級特性探秘 ·····································································.89
5.1 遠程認證··················································································.90
5.1.1 可信域度量信息生成···························································.91
5.1.2 可信域引證生成·································································.93
5.1.3 度量報告及生成·································································.94
5.1.4 可信域引證數據結構···························································.98
5.1.5 可信域引證驗證·································································100
5.2 熱遷移·····················································································102
5.2.1 熱遷移流程·······································································103
5.2.2 狀態和數據遷移·································································107
5.3 嵌套虛擬化···············································································108
5.4 TCB 在線升級···········································································108
5.5 內存完整性···············································································109
第 6 章 機密虛擬化軟件形態···························································115
6.1 機密虛擬機···············································································116
6.1.1 虛擬化技術原理·································································116
6.1.2 機密虛擬機技術概念及發展··················································117
6.1.3 安全機制········································································.118
6.1.4 I/O 數據保護 ···································································.120
6.2 機密容器 ················································································.121
6.2.1 容器運行時安全·······························································.121
6.2.2 機密容器架構··································································.123
6.2.3 主要特性········································································.124
6.3 安全操作系統 ··········································································.129
6.3.1 操作系統安全··································································.129
6.3.2 星綻操作系統內核····························································.132
6.3.3 基於機密計算構建安全操作系統 ··········································.133
6.4 TDX 的系統軟件棧···································································.138
6.4.1 基本組件········································································.138
6.4.2 Linux 發行版的支持 ··························································.140
第三篇 實踐案例
第 7 章 聯邦學習···········································································.145
7.1 聯邦學習介紹 ··········································································.146
7.2 機密計算與聯邦學習的結合 ························································.148
7.3 橫向聯邦學習方案 ····································································.149
第 8 章 可信大模型·······································································.153
8.1 構建安全可信大模型 ·································································.154
8.1.1 大模型數據安全隱患·························································.154
8.1.2 機密計算助力構建可信大模型 ·············································.156
8.2 可信大模型應用場景 ·································································.157
8.3 大模型密態計算平臺案例 ···························································.159
8.3.1 TrustFlow ·······································································.160
8.3.2 螞蟻密算大模型服務···························································163
第 9 章 雲數據庫 ············································································167
9.1 雲數據庫與數據安全···································································168
9.2 全密態數據庫············································································169
9.3 典型案例··················································································173
9.3.1 瑤池全密態數據庫······························································173
9.3.2 EdgelessDB ·······································································174
9.3.3 高斯密態數據庫·································································175
第 10 章 區塊鏈··············································································177
10.1 區塊鏈技術·············································································178
10.2 區塊鏈應用的挑戰 ····································································179
10.3 典型案例················································································181
10.3.1 Azure 機密賬本 ································································181
10.3.2 螞蟻隱私保護合約鏈 ·························································182
10.3.3 機密計算在隱私公鏈中的應用 ·············································184
第 11 章 異構計算 ··········································································187
11.1 異構計算與安全性挑戰 ······························································188
11.1.1 異構計算 ········································································188
11.1.2 優勢分析 ········································································189
11.1.3 安全性挑戰 ·····································································189
11.2 異構機密計算··········································································191
11.2.1 發展歷程 ········································································192
11.2.2 商用機密計算 GPU····························································193
11.3 應用案例················································································195
11.3.1 異構計算中的遠程認證 ······················································195
11.3.2 構建機密 AI 訓練······························································197
第 12 章 遠程認證服務 ·································································.199
12.1 MAA ···················································································.200
12.1.1 MAA 概覽·····································································.200
12.1.2 MAA 應用案例·······························································.201
12.2 ITA ·····················································································.202
12.2.1 ITA 架構·······································································.202
12.2.2 ITA 應用案例·································································.205
第四篇 未來展望
第 13 章 安全防護的持續完善·······················································.213
13.1 側信道防禦能力提升 ·······························································.214
13.2 可信性的增強 ········································································.215
13.2.1 主要局限 ······································································.215
13.2.2 發展方向 ······································································.216
13.2.3 零知識證明應用 ·····························································.217
13.3 異構計算的協同保護 ·······························································.218
第 14 章 生態系統的協同發展·······················································.221
14.1 法規與監管體系 ·····································································.222
14.1.1 隱私保護立法 ································································.222
14.1.2 跨境數據流動體系建設 ····················································.223
14.2 多元技術融合 ········································································.224
14.2.1 隱私計算融合 ································································.224
14.2.2 軟件供應鏈安全 ·····························································.225
14.3 標準化生態 ···········································································.226
參考文獻 ·························································································.228
