Secure Multitenancy in TEEs
Enabling Multi-DAO, Multi-Jurisdictional Execution on Shared Infrastructure Without Compromising Trust Domains
4.4.1 The Problem of Resource Contention in Sovereign Execution
As NSF scales across:
Jurisdictions (e.g., WFP, ICAO, UNDRR, EU, WHO)
Domains (health, finance, environment, security)
Institutions (DAOs, treaty bodies, sovereign nodes)
Clause execution infrastructure must support secure multitenancy:
Multiple governance actors using the same physical nodes—without ever compromising privacy, execution fidelity, or attestation integrity.
Traditional cloud-based multitenancy introduces risks:
Memory leakage
Side-channel attacks
Co-tenant poisoning
Resource starvation
Non-deterministic behavior under contention
NSF introduces TEE-based secure multitenancy with:
Cryptographic workload isolation
DAO-scoped runtime enforcement
Per-clause scheduling constraints
Verifiable workload audit trails
4.4.2 NSF Multitenancy Model Overview
In NSF, multitenancy is not process-based, it is enclave-scoped.
Each execution instance runs in a separate, attested enclave container, bound to:
A single clause
A governance domain
A jurisdictional scope
A time-limited execution ID
Multiple tenants (DAOs, states, treaties) can:
Submit workloads to shared TEE clusters
Be scheduled concurrently
Retain full isolation with hardware, runtime, and memory separation
4.4.3 Enclave-Oriented Tenant Segregation
Memory
Hardware-enforced boundary (SGX/SEV page-level encryption)
Filesystem
Sealed storage per workload instance
Runtime
Single-tenant Enarx/SGX enclave per clause execution
Networking
No direct access; all I/O mediated via secure runtime layer
Keys
Per-tenant attestation keys; not shared between DAOs
Audit trail
Tenant-specific logs, stored and hashed separately
Each execution is tagged with:
"tenant": {
"dao": "ClimateDAO",
"jurisdiction": "DEU",
"clause_id": "UNFCCC::[email protected]"
}
4.4.4 Execution Scope Enforcement at Runtime
Before any clause is loaded into a TEE, the scheduler:
Validates tenant’s execution credential (TEEExecutorVC)
Verifies clause and governance metadata
Instantiates an enclave runtime with:
Execution scope
Memory bounds
Clause and DAO identifiers
Assigns a unique execution ID + CAC output address
Starts the workload under sealed input conditions
No clause can ever “see” or influence another tenant’s workload.
4.4.5 Tenant Isolation in Enarx
NSF’s preferred runtime abstraction—Enarx—supports:
Per-tenant WebAssembly sandbox instantiation
Hardware-backed attestation of runtime config
Auditable workload segregation
Stateless enclave execution (no lingering secrets)
Per-execution sealing and CAC output signing
This makes it possible to run 1000s of governance workloads in parallel—with verifiable separation.
4.4.6 Resource Scheduling and QoS for Multi-DAOs
NSF supports:
Governance-priority queues (e.g., disaster > finance > planning)
Jurisdictional quotas
DAO bandwidth tokens (for fair usage)
Peak load overflow routing to secondary nodes
Audit-tracked denial/retry logging
The scheduler operates under:
Cryptographically enforced tenancy metadata
Dynamic workload telemetry
Governance policy filters (e.g., “don’t schedule health clauses on unverified nodes”)
4.4.7 CAC Generation with Tenant Metadata
Each CAC includes a tenant segment:
"tenant_info": {
"dao": "WFP-RegionalDAO",
"jurisdiction": "KEN",
"resource_class": "Disaster::Flood@v1",
"workload_id": "exec-0x83719d..."
}
This enables:
DAO-specific post-processing
Jurisdictional dispute mapping
Billing or token accounting
Node workload attribution
4.4.8 Multitenancy Fault Isolation and Escalation Paths
If one workload fails (e.g., due to input error, runtime fault, or simulation failure), NSF ensures:
No side-channel data leakage
Failure is logged only in tenant’s audit trace
Runtime is reset to zero state
No retry until governance policy re-authorizes
Optional notification to parent DAO or treaty monitor
Cross-tenant spillover is cryptographically impossible by design.
4.4.9 Governance Policy Controls on Multitenancy
DAOs may define policies such as:
“Only execute in nodes operated in-country”
“Disallow co-location with unauthorized treaty participants”
“Require attestations from 3 independent enclaves”
“Never run health workloads with finance triggers on same node”
These rules are enforced at:
TEE provisioning time
Execution queue time
CAC validation time
4.4.10 Secure Multitenancy as the Future of Institutional Compute
NSF’s multitenancy model makes it possible for:
Sovereigns
Treaties
DAOs
Research networks
NGOs
To share infrastructure without compromising sovereignty, compliance, or trust.
Multitenancy becomes:
Not a vulnerability
But a verifiable optimization for running the future of global risk governance—at scale, and with cryptographic integrity.
Last updated
Was this helpful?