Secure Execution of AI Pipelines on Confidential Cloud Infrastructure

Authors

  • Rafael Costa Independent Researcher Porto, Portugal, PT, 4000-001 Author

Keywords:

Confidential Computing, Trusted Execution Environments, Intel SGX, AMD SEV, Secure AI Pipelines, Cloud Security

Abstract

With the explosive growth of artificial intelligence (AI) services in recent years, organizations are increasingly relying on cloud platforms to execute end-to-end AI pipelines—spanning data ingestion, preprocessing, model training, and inference. While cloud infrastructures offer unparalleled scalability and cost advantages, they also introduce significant risks: untrusted hypervisors, co-tenant attacks, and privileged insider threats can expose sensitive data and proprietary model parameters. Confidential computing, realized via hardware-enforced Trusted Execution Environments (TEEs) such as Intel SGX and AMD SEV, seeks to mitigate these risks by isolating code and data within protected enclaves. Despite the promise of TEEs, integrating them seamlessly into existing AI toolchains presents architectural, performance, and usability challenges. This manuscript presents SecureAI, a comprehensive framework for orchestrating AI workflows on confidential cloud infrastructure. We detail enclave provisioning, secure data ingestion, framework adaptation for TensorFlow and PyTorch, distributed parameter management, and end-to-end attestation. Through rigorous security analysis, we enumerate threat models and countermeasures. Empirical benchmarks on CIFAR-10 training with ResNet-50 quantify overheads: SGX enclaves incur ~25% runtime overhead, while AMD SEV adds ~17%. A Kubernetes-based simulation of mixed SGX/standard nodes highlights scheduling strategies that balance security and throughput. Our results demonstrate that SecureAI achieves strong confidentiality and integrity guarantees with acceptable performance trade-offs, paving the way for practical deployment of secure AI services in the public cloud.

Downloads

Download data is not yet available.

Published

2026-02-02

Issue

Section

Original Research Articles

How to Cite

Secure Execution of AI Pipelines on Confidential Cloud Infrastructure. (2026). World Journal of Future Technologies in Computer Science and Engineering, 2(1), Feb (25-35). https://www.wjftcse.org/index.php/wjftcse/article/view/113

Similar Articles

1-10 of 76

You may also start an advanced similarity search for this article.