A large number of commercial services are nowadays using personal data of their users, such as their location, purchase transactions, payment transactions, social security numbers, activity data, authentication data, social interactions, browsing history, and more. These data are commonly used to deliver personalized applications in a variety of application sectors, including retail, finance, healthcare and social media. Nevertheless, the extensive collection and use of personal data raises important privacy and data protection concerns. For instance, consumers are interested in preventing the use of their data for purposes other than the ones specified in the data collection process. Likewise, they would like to have fine grained control over their data through controlling when and with whom to share data. Citizens and businesses are in several cases reluctant to share their data as means of mitigating the above risks. This leads to “data silos” i.e. data analytics processes and data intensive applications that are addressed to the data producers only and which do not provide opportunities for repurposing and reusing data across different applications.
Much as this reluctance is a privacy protection measure, it is also a set-back to innovation. The breaking of the data silos and the ability to reuse datasets across data-intensive applications could unveil significant opportunities for innovative applications. As a prominent example, by combining data from different financial organizations, it is possible to create more accurate user profile for highly personalized applications. As another example, the integration of healthcare data that are collected by different people, devices and applications can facilitate the extraction of medical knowledge, thus opening new horizons to clinical research and observational studies. Therefore, it’s important to lower the data sharing barriers, through alleviating risks and offering data providers with incentives to share their data beyond a single application. One of the best ways to provide incentives for data sharing is to create a data market as a tool for connecting the demand (i.e. data buyers) with the supply side (i.e. data providers) based on secure and trustworthy data exchange mechanisms. In the scope of a data market, multiple providers are willing to share their data in exchange of some monetary or other incentive. At the same time, data buyers have the opportunity of accessing data from multiple providers at a specified cost.
There are also technological measures that can encourage and facilitate data exchange, notably measures based on privacy enhancing and privacy awareness mechanisms. The latter aim at safeguarding the privacy of data providers at all times. One of the most prominent privacy enhancing mechanisms for data intensive applications, concerns the employment of privacy preserving analytics techniques.
Privacy preserving analytics schemes aim at analyzing data from a source, without disclosing information about it and in a way that minimizes the risk of presenting the source’s data to malicious parties (e.g., enterprises that would like to exploit users’ personal data). In essence, privacy preserving analytics techniques enable application developers to analyze vast amounts of personal data, without however compromising the source data. In practice, this means that application developers and end users can see the outcomes of the analysis (e.g., the answers and results of a query) without disclosing information about the source data where this query was executed.
When querying or analyzing data from a single source, there is a straightforward way for safeguarding the privacy of the source: Moving the query to the data source, rather than moving the data to the analytics through the network. As soon as the data remain at the system of the data provider, they can be secure and private. Nevertheless, the tactic of moving the query to the data source cannot work in cases where data from multiple data providers need to be processed, which is a common and useful scenario in the scope of a data market. In such cases some data have to be moved outside the organization of the data provider, which makes them susceptible to eavesdropping and other forms of hacking. In order to alleviate relevant privacy concerns, the data that are moved out of the organization can be encrypted. Furthermore, secure computing techniques can be employed in order to enable execution of queries on data that remain encrypted at all times.
Secure computation solutions provide a means to query data without ever decrypting them, which offers a solution for cases where data owners lose control of the data analytics process, typically when their data needs to be processed outside their organization. In particular, based on secure computation data analyzers can obtain answers to a query, without decrypting source data, which permits data owners to retain control of their data at all times. Secure computing schemes are based on advanced mathematical and cryptographic formulations such as:
These secure computing schemes have been known to the research community for several decades. However, their practical applicability in real life applications beyond research prototypes has been quite limited, mainly due to the poor performance of the corresponding implementations. This situation has changed during recent years, where the maturity and performance of secure computing frameworks have been improved. This is clearly reflected in the emergence of start-up enterprises that offer cryptographic products and privacy preserving services based on secure computing techniques. As a prominent example, Unbound (MPC) applies secure computing in order to ensure that secrets such as cryptographic keys, credentials and private data are never processed in complete form. Likewise, Sepior leverages secure computing techniques to provide threshold key management solutions for blockchain, cryptocurrencies, and cloud services providers infrastructures. There have also been remarkable academic projects on secure computing, such as MIT’s Enigma project that offers a decentralized platform for secure computing based on blockchain technology. Beyond research efforts and start-ups, secure computing is nowadays integrated with several products of large IT providers.
The practical applicability of secure computing is largely due to the emergence of specialized high performance hardware. Nevertheless, practical deployments remain challenging for performance reasons. According to some benchmarks, homographic encryption is still million times slower than traditional computations, which is the reason why secure computing techniques leverage specialized hardware mechanisms in modern CPUs like Intel’s Secure Guard Extensions (SGX).
In the coming years, we expect to see rising needs for privacy preserving processing of datasets, as part of the wave of BigData and Artificial Intelligence (AI) applications. Assuring end-users that their data remain encrypted at all times can lower the barriers of data sharing, while relaxing relevant privacy concerns. Secure computing can provide a great technical contribution in this forefront, especially as evolution in hardware and computing make it a viable alternative for privacy preserving analytics.
Technology Enablers of Manufacturing-as-a-Service
Five Tips for a Successful ChatGPT Strategy
Machine Learning as a Service (MLaaS): The basics
AI as a Medical Device in Healthcare
The Industrial Metaverse Explained
Next-Gen Resilience: Can companies deal with large-scale disruptions?
The Art & Science of Estimating User Stories Cost
Embedded Finance: The basics you need to know
No obligation quotes in 48 hours. Teams setup within 2 weeks.
If you are a Service Provider looking to register, please fill out this Information Request and someone will get in touch.
Outsource with Confidence to high quality Service Providers.
Enter your email id and we'll send a link to reset your password to the address we have for your account.
The IT Exchange service provider network is exclusive and by-invite. There is no cost to get on-board; if you are competent in your areas of focus, then you are welcome. As a part of this exclusive network you: