机密计算概览
使用集合让一切井井有条
根据您的偏好保存内容并对其进行分类。
机密计算是一种通过基于硬件的可信执行环境 (TEE) 来保护使用中的数据的方法。TEE 是安全且独立的环境,可防止对使用中的应用和数据进行未经授权的访问或修改。此安全标准由机密计算联盟定义。
端到端加密
端到端加密涉及三种状态:
静态加密可保护存储的数据。
传输中的加密可保护两点之间传输的数据。
使用中加密可在数据处理过程中保护数据。
机密计算提供最后的端到端加密:使用中的加密。
机密计算服务
Google Cloud 提供以下机密计算产品:
机密虚拟机还可用于以下产品:
后续步骤
如未另行说明,那么本页面中的内容已根据知识共享署名 4.0 许可获得了许可,并且代码示例已根据 Apache 2.0 许可获得了许可。有关详情,请参阅 Google 开发者网站政策。Java 是 Oracle 和/或其关联公司的注册商标。
最后更新时间 (UTC):2025-08-18。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-08-18。"],[[["\u003cp\u003eConfidential Computing uses hardware-based Trusted Execution Environments (TEEs) to protect data while it's being used, preventing unauthorized access or modification.\u003c/p\u003e\n"],["\u003cp\u003eConfidential Computing completes the end-to-end encryption trifecta by providing encryption in use, alongside encryption at rest and in transit.\u003c/p\u003e\n"],["\u003cp\u003eGoogle Cloud offers a range of Confidential Computing products, including Confidential VM, Confidential Space, Google Cloud Attestation, and a split-trust encryption tool.\u003c/p\u003e\n"],["\u003cp\u003eConfidential VMs are also available to be used with Dataflow, Dataproc, and Google Kubernetes Engine.\u003c/p\u003e\n"]]],[],null,["# Confidential Computing overview\n\nConfidential Computing is the protection of data in-use using a hardware-based\nTrusted Execution Environment (TEE). TEEs are secure and isolated environments\nthat prevent unauthorized access or modification of applications and data while\nthey are in use. This security standard is defined by the\n[Confidential Computing Consortium](https://confidentialcomputing.io/).\n\nEnd-to-end encryption\n---------------------\n\nEnd-to-end encryption involves three states:\n\n- *Encryption at rest* protects your data while it is being stored.\n\n- *Encryption in transit* protects your data when it is moving between two\n points.\n\n- *Encryption in use* protects your data while it is being processed.\n\nConfidential Computing provides the last piece of end-to-end encryption:\nencryption in use.\n\nConfidential Computing services\n-------------------------------\n\nGoogle Cloud offers the following Confidential Computing products:\n\n- [Confidential VM](/confidential-computing/confidential-vm/docs/confidential-vm-overview)\n\n- [Confidential Space](/confidential-computing/confidential-space/docs/confidential-space-overview)\n\n- [Google Cloud Attestation](/confidential-computing/docs/attestation)\n\n- [Split-trust encryption tool](/confidential-computing/docs/split-trust-encryption-tool)\n\nConfidential VM is also available for use in the following products:\n\n- [Dataflow](/dataflow/docs/reference/service-options)\n\n- [Dataproc](/dataproc/docs/concepts/configuring-clusters/confidential-compute)\n\n- [Google Kubernetes Engine](/kubernetes-engine/docs/how-to/confidential-gke-nodes)\n\n- [Vertex AI Workbench](/vertex-ai/docs/workbench/instances/create-confidential-computing)\n\nWhat's next\n-----------\n\n- Learn about [confidential computing for data analytics, AI, and federated learning](/architecture/confidential-computing-analytics-ai).\n- Learn about [Google Cloud Attestation](/confidential-computing/docs/attestation)."]]