Monday, March 8, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

IBM releases toolkit aimed at keeping data encrypted even while in use

June 6, 2020
in Internet Security
IBM releases toolkit aimed at keeping data encrypted even while in use
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

Eleven years ago,IBM made a breakthrough in the development of fully homomorphic encryption (FHE), a technology that allows for computation and analysis of data while keeping it encrypted. FHE holds significant promise for a number of uses, IBM says — particularly any operations that involve highly sensitive data that must be protected. 

However, FHE remains a complicated technology that’s hard to implement. IBM aims to change that with the release of new toolkits that should help developers start experimenting with FHE and eventually incorporate it into the products they build. The toolkit is available today in GitHub for MacOS and iOS, and it will soon be available for Linux and Android. 

You might also like

eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’

Maza Russian cybercriminal forum suffers data breach

Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud

Today, files are often encrypted in transit and at rest but decrypted while in use, creating a security vulnerability. This often compels organizations to make trade-offs and go through long vetting processes in order to ensure they can keep their valuable data protected while still gaining some value out of it. FHE aims to resolve that issue.  

“If we are able to perform computation with data encrypted, we can address this paradox of the need to know versus the need to share,” Flavio Bergamaschi, FHE pioneer and IBM Researcher, explained to reporters. “It’s almost the same as enabling the processing of that data without getting access to it. If we can achieve that, we are adding a level of security beyond what [exists] today.”

FHE is particularly well-suited for heavily-regulated industries like finance and healthcare, Bergamaschi said. 

“Whenever you have ‘crown jewel’ data you want to protect, this is potentially the right type of encryption to work with,” he said.

Based on lattice cryptography, FHE is “to the best of our knowledge” quantum resistant, Bergamaschi. 

While the technology holds great potential, it does require a significant shift in the security paradigm. Typically, inside the business logic of an application, data remains decrypted, Bergamaschi explained. But with the implementation of FHE, that’s no longer the case — meaning some functions and operations will change. In other words, “There will be a need to rewrite parts of the business logic,” Bergamaschi said. “But the security that you gain with that, where the data is encrypted all the time, is very high.”

Bergamaschi outlined four use case archetypes well-suited for FHE. First, the technology makes sense for enabling “oblivious queries” — when you perform a query without revealing the intent. This is relevant, for example, with map applications that learn things about you — such as where you are and where you want to go — each time you perform a query. 

FHE also holds promise for data set intersection, when you have two data sets but only want to work with the overlapping data. This is useful in a variety of areas, from genomics analytics to joint marketing campaigns. FHE should also be useful for secure outsourcing — such as outsourcing computation to the cloud — as well as extracting value from private data. 

To prove its value in the last area — extracting value from private data — IBM completed a proof of concept with Brazil’s Bradesco Bank, the second-largest bank in South America. The goal was to use FHE to securely analyze customer data in order to predict whether someone would require a loan within three months. Typically, the bank’s data analysts have to work in a heavily protected, segregated environment to perform this kind of data analysis, to make sure the decrypted customer data stays safe. 

Researchers used a large data set — 360,000 customer IDs, each with 546 different features — and put a homomorphic encryption layer between the data and the analysts. They proved they could deliver predictions with the same accuracy as they could without encryption. 

While the technology is still in development, IBM is interested now in getting it into the hands of developers to make the concept less abstract. The toolkits now available are based on HELib, a mature and versatile encryption library. They include sample programs and IDE integration, making it easier to write FHE-based code.

Credit: Zdnet

Previous Post

This New Xbox Feature Targets Steam – But What Does It Mean for the PS5?

Next Post

AI in Hacking - Becoming Human: Artificial Intelligence Magazine

Related Posts

Bill establishing cyber abuse takedown scheme for adults enters Parliament
Internet Security

eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’

March 8, 2021
Maza Russian cybercriminal forum suffers data breach
Internet Security

Maza Russian cybercriminal forum suffers data breach

March 7, 2021
Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud
Internet Security

Okta and Auth0: A $6.5 billion bet that identity will warrant its own cloud

March 7, 2021
CISA issues emergency directive to agencies: Deal with Microsoft Exchange zero-days now
Internet Security

CISA issues emergency directive to agencies: Deal with Microsoft Exchange zero-days now

March 7, 2021
Linux distributions: All the talent and hard work that goes into building a good one
Internet Security

Linux distributions: All the talent and hard work that goes into building a good one

March 7, 2021
Next Post
AI in Hacking – Becoming Human: Artificial Intelligence Magazine

AI in Hacking - Becoming Human: Artificial Intelligence Magazine

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Dataiku named as Gartner Leader for Data Science and Machine Learning
Machine Learning

Dataiku named as Gartner Leader for Data Science and Machine Learning

March 8, 2021
Bill establishing cyber abuse takedown scheme for adults enters Parliament
Internet Security

eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’

March 8, 2021
An Easy Way to Solve Complex Optimization Problems in Machine Learning
Data Science

An Easy Way to Solve Complex Optimization Problems in Machine Learning

March 8, 2021
Machine Learning Patentability In 2019: 5 Cases Analyzed And Lessons Learned Part 4 – Intellectual Property
Machine Learning

Podcast: Non-Binding Guidance: FDA Regulatory Developments In AI And Machine Learning – Food, Drugs, Healthcare, Life Sciences

March 8, 2021
Here’s an adorable factory game about machine learning and cats
Machine Learning

Here’s an adorable factory game about machine learning and cats

March 8, 2021
How Machine Learning Is Changing Influencer Marketing
Machine Learning

How Machine Learning Is Changing Influencer Marketing

March 8, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Dataiku named as Gartner Leader for Data Science and Machine Learning March 8, 2021
  • eSafety defends detail of Online Safety Bill as the ‘sausage that’s being made’ March 8, 2021
  • An Easy Way to Solve Complex Optimization Problems in Machine Learning March 8, 2021
  • Podcast: Non-Binding Guidance: FDA Regulatory Developments In AI And Machine Learning – Food, Drugs, Healthcare, Life Sciences March 8, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates