Home
International Journal of Science and Research Archive
International, Peer reviewed, Open access Journal ISSN Approved Journal No. 2582-8185

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • IJSRA CrossMark Policy
    • Publication Ethics
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN Approved Journal || eISSN: 2582-8185 || CODEN: IJSRO2 || Impact Factor 8.2 || Google Scholar and CrossRef Indexed

Peer Reviewed and Referred Journal || Free Certificate of Publication

Research and review articles are invited for publication in March 2026 (Volume 18, Issue 3) Submit manuscript

Confidential-computing cyber defense platform sharing threat intelligence, fortifying critical infrastructure against emerging cryptographic attacks nationwide

Breadcrumb

  • Home
  • Confidential-computing cyber defense platform sharing threat intelligence, fortifying critical infrastructure against emerging cryptographic attacks nationwide

Yusuff Taofeek Adeshina 1, * and Desmond Ohene Poku 2

1 Department of Business Analytics, Pompea College of Business, University of New Haven, United States of America.
2 Consultant- Cybersecurity and Supply Chain Security, Graduate student, University of Fairfax, Member, CSCMP

Research Article

International Journal of Science and Research Archive, 2025, 16(02), 231-246

Article DOI: 10.30574/ijsra.2025.16.2.2302

DOI url: https://doi.org/10.30574/ijsra.2025.16.2.2302

Received on 25June 2025; revised on 02August 2025; accepted on 04August 2025

In an era marked by increasingly sophisticated cyber threats and growing vulnerabilities in national critical infrastructure, this study explores the transformative role of confidential computing in defending against emerging cryptographic attacks and enabling secure threat intelligence sharing. Traditional cybersecurity measures, while effective for protecting data at rest and in transit, fall short in securing data during active processingan area exploited by advanced persistent threats, quantum computing, and side-channel attacks. This research investigates how hardware-based trusted execution environments (TEEs), homomorphic encryption, and zero-knowledge proofs embedded in confidential-computing platforms can preserve the confidentiality of sensitive operations even within potentially compromised environments. Through detailed case studies of major U.S. institutionsincluding PGandE, Exelon, JPMorgan Chase, Wells Fargo, and Kaiser Permanentethe paper demonstrates significant improvements in detection speed, false positive reduction, and operational efficiency. Furthermore, it proposes a scalable, privacy-preserving framework for collaborative cyber defense across critical sectors such as energy, finance, and healthcare. The findings underscore that integrating confidential computing with decentralized intelligence sharing networks not only enhances cybersecurity resilience but also yields substantial economic and regulatory benefits. This work advocates for a national, and eventually global, shift toward confidential-computing-enabled infrastructures to achieve robust, cooperative, and future-proof cyber defense ecosystems.

Confidential Computing; Threat Intelligence Sharing; Critical Infrastructure Protection; Cryptographic Attacks; Trusted Execution Environments (TEEs)

https://ijsra.net/sites/default/files/fulltext_pdf/IJSRA-2025-2302.pdf

Preview Article PDF

Yusuff Taofeek Adeshina and Desmond Ohene Poku. Confidential-computing cyber defense platform sharing threat intelligence, fortifying critical infrastructure against emerging cryptographic attacks nationwide. International Journal of Science and Research Archive, 2025, 16(02), 231-246; Article DOI: https://doi.org/10.30574/ijsra.2025.16.2.2302

Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


All statements, opinions, and data contained in this publication are solely those of the individual author(s) and contributor(s). The journal, editors, reviewers, and publisher disclaim any responsibility or liability for the content, including accuracy, completeness, or any consequences arising from its use.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content

          

   

Copyright © 2026 International Journal of Science and Research Archive - All rights reserved

Developed & Designed by VS Infosolution