TRENDING
  • Privacy Policy
  • Write For US
  • Contact Us
  • About Us
No Result
View All Result
  • Home
  • Business
  • Technology
  • Startups
  • Reviews
  • How To
  • Security
  • Devices
    • Smartphones
    • Tablets
    • TV
    • Wear
  • Internet
  • Marketing
  • Services
SUBSCRIBE
  • Home
  • Business
  • Technology
  • Startups
  • Reviews
  • How To
  • Security
  • Devices
    • Smartphones
    • Tablets
    • TV
    • Wear
  • Internet
  • Marketing
  • Services
No Result
View All Result
No Result
View All Result
Home Technology

Confidential computing offers revolutionary data encryption, says UC Berkeley professor

by Janice Allen
November 5, 2022
in Technology
0
Confidential computing offers revolutionary data encryption, says UC Berkeley professor
Share on FacebookShare on Twitter

To further strengthen our commitment to providing industry-leading data technology coverage, VentureBeat is pleased to welcome Andrew Brust and Tony Baer as regular contributors. Look for their articles in the Data Pipeline.

Confidential computing focuses on potentially revolutionary technology, in terms of its impact on data security. Confidential computing keeps data encrypted, not only at rest and in transit, but also in use, allowing analytics and machine learning (ML) to be performed on the data while preserving its confidentiality. The ability to encrypt data in use opens up a huge range of possible real-world scenarios, and it has major implications and potential benefits for the future of data security.

VentureBeat spoke to Raluca Ada Popa about her research and work developing practical solutions for confidential computing. Popa is a Colleague Professor at the University of California, Berkeley, and she is also the co-founder and president of Opaque systems.

Opaque Systems offers a software offering for the: MC2 open-source confidential computer project, to help companies that are interested in using this technology, but may not have the technical expertise to operate at the hardware level.

Contents

  • 1 The Journey of Confidential Computing
    • 1.1 Event
  • 2 An approach to the best of both worlds
  • 3 Hardware Enclaves Vendors Compete
  • 4 Further implications
  • 5 Real World Scenarios of confidential computer use
  • 6 Charting a course

The Journey of Confidential Computing

Popa went through the history of confidential computing, the mechanics and the usage scenarios. The problems confidential computing must address have been around for decades, with several people working to solve them. She explained that as early as 1978, Rivest et al. acknowledged the privacy, confidentiality, and functionality benefits that would come from being able to rely on encrypted data, although they were not developing a practical solution at the time.

Event

Top with little code/no code

Join today’s leading executives at the Low-Code/No-Code Summit virtually on November 9. Register for your free pass today.

Register here

In 2009, Craig Gentry developed the first practical construct, a fully cryptographic solution called fully homomorphic encryption (FHE). In FHE, the data remains encrypted and the calculation is performed on the encrypted data.

However, Popa explained that the FHE was “orders of magnitude too slow” to allow for analytics and machine learning, and while the technology has been refined since then, the speed is still not optimal.

An approach to the best of both worlds

Popa’s research combines recent advances in hardware that have emerged in recent years, called hardware enclaves, with cryptography into a practical solution. Hardware enclaves provide a trusted execution environment (TEE) that isolates data from software and from the operating system. Popa described the hybrid approach of combining hardware enclaves with cryptography as the best of both worlds. Within the TEE, the data is decoded and a calculation is performed on this data.

“Once it leaves the hardware box, it’s encrypted with a key fused into the hardware…” Popa said.

“It looks like it’s always encrypted from an operating system’s or administrator’s or hacker’s point of view…[and] any software running on the machine… only sees encrypted data,” she added. “So it actually achieves the same effect as the cryptographic mechanisms, but it has processor speeds.”

Combining hardware enclaves with cryptographic computation enables faster analytics and machine learning, and Popa said that for the “first time,” we have a truly hands-on solution for analytics and machine learning on confidential data.”

Hardware Enclaves Vendors Compete

To develop and implement this technology, Popa explained that she and her team at UC Berkeley’s RISELab “got early access from Intel to his SGX hardware enclave, the pioneer enclave’, and in their research determined that ‘the right use case’ for this technology is confidential computing. Today, in addition to Intel, there are several other vendors, including: AMD and Amazon Web Services (AWS), have released their own processors with hardware enclave technology.

However, there are some differences between the vendors’ products, in terms of speed and integrity, as well as user experience. According to Popa, the Intel SGX typically has stronger integrity guarantees, while the AMD SEV enclave is faster.

She added that AWS’s Nitro enclaves are mostly software-based and don’t have the same level of hardware protection as Intel’s SGX. Intel SGX requires code refactoring to run legacy software, while AMD SEV and Amazon Nitro enclaves are more suited to legacy applications. Each of the three cloud providers, Microsoft, google and Amazonalso has enclave offers.

Because hardware enclave technology is “very raw, they provide a very low-level interface,” she explained — Opaque Systems provides an “analysis platform built specifically for confidential computing,” designed to optimize the open-source MC.2 confidential computer project for companies that want to use this technology to “facilitate collaboration and analysis” on confidential data. The platform includes multi-layered security, policy management, governance, and assistance with setting up and scaling enclave clusters.

Further implications

Confidential computing has the potential to change the game for access control as well. Popa explained that “the next step that enables encryption is not to give access to just the data, but to some function result on it.” For example, not giving access “to” [the] full data, but only for a model trained on [the] data. Or maybe to a query result, to a statistic, to an analysis query based on [the] data.”

In other words, instead of granting access to specific rows and columns of data, access would be granted to an aggregate, a specific type of output or by-product of the data.

“This is where confidential computing and encryption really come into play… I encrypt the data and you do confidential computing and calculate the correct function while you [the data] encrypted… and only the end result is revealed,” Popa said.

Function-based access control also has implications for ethics, as machine learning models can be trained on encrypted data without compromising personal or private data or revealing information that could lead to bias.

Real World Scenarios of confidential computer use

Enabling companies to take advantage of analytics and machine learning on confidential data, and enabling access to data functions, creates a broad range of possible use cases. Chief among these are situations where collaboration is possible between organizations that were previously unable to work together due to the mutually confidential nature of their data.

For example, Popa explained that “traditionally, banks cannot share their confidential data with each other;” However, with its platform to help businesses take advantage of confidential computing, Opaque Systems allows banks to pool their data confidentially, while analyzing patterns and training models to more effectively detect fraud.

In addition, she said, “healthcare facilities” [can] pool their patient data to find better diagnoses and treatments for diseases”, without compromising data protection. Confidential computing also helps break down walls between departments or teams with confidential data within the same company, allowing them to collaborate where they couldn’t before.

Charting a course

The potential of confidential computing with hardware enclaves to revolutionize the computing world was recognized this summer when Popa won the award ACM Grace Murray Hopper Award 2021.

“The fact that the ACM community is recognizing the technology of computing on encrypted data… as an outstanding achievement that is revolutionizing computing… gives a lot of credibility to the fact that this is a very important issue, which we should be confronted with.” work,” Popa said — and for which her research and work have provided a practical solution.

“It will help because of this confirmation for the problem and for the contribution,” she said.

The mission of VentureBeat is a digital city square for tech decision makers to learn about transformative business technology and transactions. Discover our briefings.

Janice Allen
Janice Allen

Janice has been with businesskinda for 5 years, writing copy for client websites, blog posts, EDMs and other mediums to engage readers and encourage action. By collaborating with clients, our SEO manager and the wider businesskinda team, Janice seeks to understand an audience before creating memorable, persuasive copy.

ShareTweetPin

Related Posts

Technology

Ensuring Data Security: A Comprehensive Backup for VMware

September 8, 2023
The Benefits of Outdoor Pods
Technology

The Benefits of Outdoor Pods

September 5, 2023
Twitter is renamed X
Technology

Twitter is renamed X

July 24, 2023
Apple is expanding protection against unsolicited nude photos in iOS 17
Technology

Apple’s GPT chatbot is already in use internally

July 23, 2023
Star Trek: Strange New Worlds is getting a musical episode following the announcement of SDCC 2023
Technology

Star Trek: Strange New Worlds is getting a musical episode following the announcement of SDCC 2023

July 23, 2023
The Sony Project Q PlayStation handheld runs Android in a leaked video
Technology

The Sony Project Q PlayStation handheld runs Android in a leaked video

July 22, 2023
Next Post
How Zette plans to give people access to paywall news with a single monthly subscription • businesskinda.com

How Zette plans to give people access to paywall news with a single monthly subscription • businesskinda.com

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

  • 129 Followers
  • 952 Subscribers
  • 30 Followers

Recommended

Holmes’ conviction sends a clear signal that the startup ecosystem must be built in good faith • businesskinda.com

Holmes’ conviction sends a clear signal that the startup ecosystem must be built in good faith • businesskinda.com

November 21, 2022
Can corporates be good matchmakers for startups and VCs?

Can corporates be good matchmakers for startups and VCs?

October 9, 2022
Gen Z makes Ugg Boots fashionable again: report

Gen Z makes Ugg Boots fashionable again: report

February 4, 2023
Google Meet rolls out 360-degree virtual backgrounds for video calls

Google Keep is getting a much more capable Android widget

February 27, 2023
Age, Dimensions, Net Worth, Family

Age, Dimensions, Net Worth, Family

October 12, 2022
All the truth about Steven Seagal’s wife

All the truth about Steven Seagal’s wife

November 4, 2022
  • Write For US
  • Privacy Policy
  • About Us
  • Contact Us

DISCLAIMER
We are the Simple News website that provide awareness & support to readers. If you find any news or article that belong's to you then contact us anytime, we will remove that things or give you best credit that help for your brand.
© 2022 businesskinda.com.

No Result
View All Result
  • Home
  • Reviews
  • How To
  • Write For US
  • Business
  • Marketing
  • Startups
  • Technology

@ Copyright businesskinda.com