Security-Centric Computer Architecture: Hardware-Based Approaches for Cyber-Resilient Systems

Authors

  • Abitha Jesuraj St. Joseph’s College (Autonomous), Trichy, India Author

DOI:

https://doi.org/10.63282/3050-9262.IJAIDSML-V5I3P101

Keywords:

Cyber-resilience, Computer architecture, Hardware security, Data-centric security, Trusted platform modules, Secure enclaves, Policy-based protection

Abstract

In an era marked by increasing cyber threats, the design of computer architectures that prioritize security is paramount. This paper explores hardware-based approaches to create cyber-resilient systems, focusing on integrating security directly into the architecture rather than as an afterthought. By leveraging specialized hardware components, such as Trusted Platform Modules (TPMs) and secure enclaves, we can enhance the integrity and confidentiality of data across various computing environments. The proposed architecture emphasizes a layered security model that incorporates both preventive and reactive measures, ensuring robust protection against unauthorized access and data breaches. Additionally, we discuss the importance of a data-centric security approach, which prioritizes the protection of sensitive data throughout its lifecycle. This involves implementing policy-based controls, continuous monitoring, and automated responses to potential threats. Ultimately, this research aims to provide a framework for developing systems that not only withstand attacks but also recover quickly from incidents, thus maintaining operational continuity and trust in digital infrastructures

References

[1] https://www.zengrc.com/blog/what-is-a-data-centric-architecture-for-security/

[2] https://ee.stanford.edu/research/computer-architecture-security-hw-sw

[3] https://dl.acm.org/doi/abs/10.5555/1404803.1404838

[4] https://en.wikipedia.org/wiki/Computer_insecurity

[5] https://en.wikipedia.org/wiki/Data-centric_security

[6] https://www.mdpi.com/journal/applsci/special_issues/52U80QAE2R

[7] https://www.paloaltonetworks.com/cyberpedia/data-centric-security

[8] https://www.expresscomputer.in/guest-blogs/towards-cyber-resilience-a-data-centric-approach-to-security/105141/

[9] https://www.nextlabs.com/intelligent-enterprise/data-centric-security/

[10] https://scholarsmine.mst.edu/cgi/viewcontent.cgi?article=5592&context=masters_theses

[11] https://en.wikipedia.org/wiki/Data-centric_security

[12] https://structured.com/security/security-architecture/

[13] https://www.archtis.com/what-is-data-centric-security/

[14] https://www.researchgate.net/publication/220284156_Memory-Centric_Security_Architecture

[15] https://ieeexplore.ieee.org/document/7495578/

[16] https://www.researchgate.net/publication/375717897_A_Preprint_-_Security-Centric_Architecture_Modeling_-_Placing_Security_at_the_Heart_of_the_Architectural_Design

[17] https://swc.rwth-aachen.de/research/projects/scam-security-centric-architecture-modelling/

[18] https://holoware.co/computer-hardware-security-essential-cybersecurity-measures/

[19] https://sepiocyber.com/blog/hardware-attacks-the-art-of-disguise/

[20] https://www.intel.com/content/www/us/en/business/enterprise-computers/resources/hardware-security.html

[21] https://www.techtarget.com/searchitoperations/definition/hardware-security

[22] https://www.quarktwin.com/blogs/integrated%20circuit/12-hardware-security-threats-and-protection-methods-the-ultimate-guide-for-engineers/466

[23] https://blackbear-ics.com/cybersecurity-hardware/

[24] https://www.imperva.com/learn/application-security/cyber-security-threats/

[25] https://www.simplilearn.com/tutorials/cyber-security-tutorial/types-of-cyber-attacks

[26] https://www.electronicspecifier.com/products/cyber-security/next-generation-hardware-based-cyber-security-products

[27] https://www.intel.com/content/www/us/en/business/enterprise-computers/resources/hardware-security.html

[28] https://holoware.co/computer-hardware-security-essential-cybersecurity-measures/

[29] https://www.analog.com/en/signals/thought-leadership/why-hardware-based-design-security-essential-for-every-application.html

[30] https://www.securitymagazine.com/blogs/14-security-blog/post/98320-6-trends-driving-hardware-cybersecurity-innovation

[31] https://www.scrut.io/post/cybersecurity-architecture-and-why-is-it-important

[32] https://www.ardoq.com/blog/cybersecurity-architecture

[33] https://sprinto.com/blog/cybersecurity-architecture/

[34] https://www.it-cisq.org/2020/11/4-steps-to-fix-and-implement-cyber-resilient-architecture/

[35] https://www.geeksforgeeks.org/architecture-patterns-for-resilient-systems/

[36] https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf

[37] https://anm.com/blog/building-a-cyber-resilient-architecture/

[38] https://www.networkcomputing.com/network-resilience/structured-for-success-4-architectural-pillars-of-cyber-resilience

[39] https://www.youtube.com/watch?v=8bpbrlE5B8M

[40] https://www.linkedin.com/pulse/cyber-resilience-starts-strong-security-architecture-mahesh-pbkdf

[41] https://www.mitre.org/sites/default/files/pdf/12_3795.pdf

[42] https://www.pnnl.gov/explainer-articles/cyber-resilience

[43] https://arxiv.org/abs/2303.16307

[44] https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-160v2r1.pdf

[45] https://www.nist.gov/publications/developing-cyber-resilient-systems-systems-security-engineering-approach-0

[46] https://www.ibm.com/think/topics/cyber-resilience

[47] https://www.govinfo.gov/content/pkg/GOVPUB-C13-a6f7e6236ab28e1cfa7af636e2172e99/pdf/GOVPUB-C13-a6f7e6236ab28e1cfa7af636e2172e99.pdf

[48] https://www.researchgate.net/figure/Overview-of-the-experimental-setup-to-evaluate-the-network-intrusion-and-anomaly_fig5_360497767

[49] https://dl.acm.org/doi/10.1145/3510547.3517916

Published

2024-08-18

Issue

Section

Articles

How to Cite

1.
Jesuraj A. Security-Centric Computer Architecture: Hardware-Based Approaches for Cyber-Resilient Systems. IJAIDSML [Internet]. 2024 Aug. 18 [cited 2025 Oct. 3];5(3):1-8. Available from: https://ijaidsml.org/index.php/ijaidsml/article/view/57