Arca: A Lightweight Confidential Container Architecture for Cloud-Native Environments

๐Ÿ“… 2026-01-03
๐Ÿ›๏ธ arXiv.org
๐Ÿ“ˆ Citations: 0
โœจ Influential: 0
๐Ÿ“„ PDF
๐Ÿค– AI Summary
Existing confidential container solutions place the entire runtime within a Trusted Execution Environment (TEE), resulting in an overly large Trusted Computing Base (TCB), redundant components, and high cross-layer overhead. This work proposes Arca, which introduces an innovative TEE-in-Container architecture that isolates each workload within its own hardware-enforced trust domain while moving orchestration logic outside the TEE. This design significantly reduces the TCB, strengthens isolation, and adheres to the principle of minimal trust inherent to TEEs. Built upon hardware technologies such as Intel SGX, TDX, and AMD SEV, Arca implements a lightweight confidential container framework that achieves near-native performance across most benchmarks, substantially outperforms Confidential Containers (CoCo), and greatly enhances verifiability and resilience against host-level attacks.

Technology Category

Application Category

๐Ÿ“ Abstract
Confidential containers protect cloud-native workloads using trusted execution environments (TEEs). However, existing Container-in-TEE designs (e.g., Confidential Containers (CoCo)) encapsulate the entire runtime within the TEE, inflating the trusted computing base (TCB) and introducing redundant components and cross-layer overhead. We present Arca, a lightweight confidential container framework based on a TEE-in-Container architecture that isolates each workload in an independent, hardware-enforced trust domain while keeping orchestration logic outside the TEE. This design minimizes inter-layer dependencies, confines compromise to per-container boundaries, and restores the TEE's minimal trust principle. We implemented Arca on Intel SGX, Intel TDX, and AMD SEV. Experimental results show that Arca achieves near-native performance and outperforms CoCo in most benchmarks, while the reduced TCB significantly improves verifiability and resilience against host-level compromise. Arca emonstrates that efficient container management and strong runtime confidentiality can be achieved without sacrificing security assurance.
Problem

Research questions and friction points this paper is trying to address.

confidential containers
trusted execution environments
trusted computing base
cloud-native security
container isolation
Innovation

Methods, ideas, or system contributions that make the work stand out.

TEE-in-Container
trusted computing base
confidential containers
hardware-enforced isolation
cloud-native security
Di Lu
Di Lu
Mphil of Computer Science
Evolutionary ComputationNeural Network
M
Mengna Sun
School of Computer Science and Technology, Xidian University, Xiโ€™an, Shaanxi 710071, China, and also with the Shaanxi Key Laboratory of Network and System Security, Xiโ€™an, Shaanxi 710071, China
Qingwen Zhang
Qingwen Zhang
PhD Student, KTH (MPhil in HKUST)
autonomous drivingperceptionroboticsmapping
Y
Yujia Liu
School of Computer Science and Technology, Xidian University, Xiโ€™an, Shaanxi 710071, China, and also with the Shaanxi Key Laboratory of Network and System Security, Xiโ€™an, Shaanxi 710071, China
J
Jia Zhang
Alibaba Cloud, Hangzhou, China
Xuewen Dong
Xuewen Dong
Xidian University
Yulong Shen
Yulong Shen
Xidian University
computer security
J
Jianfeng Ma
School of Cyber Engineering, Shaanxi Key Lab of Network and System Security, Xidian University, Xiโ€™an, China