Site icon Gradient Flow

Get Ready For Confidential Computing

Companies that are able to use data securely will be well-positioned to build data and AI applications in the future.

By Assaf Araki and Ben Lorica.

The use of data within companies continues to grow exponentially. This comes at a time when data platforms and tools for analytics, data science, and AI continue to get simpler. As a result the number of data users and data applications are growing within organizations.

This growth in data usage comes at a time of heightened concern for data security and privacy. On the cybersecurity front, data breaches are at an alltime high. In addition to data breaches, users have different expectations for the security and privacy of the information they generate or share. There have also been increasing demands from regulators. Since the GDPR and the CCPA were implemented in 2018, companies have been forced to adhere to many more privacy regulations.

A comprehensive data privacy and security policy involves protecting the confidentiality and integrity of data in any of these three states: at rest, in use, and in transit. In this post we describe the ecosystem of tools focused on protecting data while in use. Our primary focus is on Confidential Computing tools for the development of data, analytic, and AI applications. We believe that companies that are able to use data securely will be well-positioned to build data and AI applications in the future.

Safeguarding data while it’s being used is particularly challenging because most applications need to have data in the clear – unencrypted or otherwise protected – in order to compute. The field of Confidential Computing encompasses tools and techniques such as hardware, cryptography, algorithms, and machine learning:

Figure: Confidential Computing – Key Technologies.

The following are examples of some of these technologies in real-world settings:

These are active research areas and there are numerous books and papers on each of these technologies. From 2016-2020 the total number of papers on the popular preprint sharing site, Arxiv, grew 166%. Over that same period the number of papers on Arxiv that contained the phrases FL, DP, and HE grew several orders of magnitude faster:

Figure 2: : Share of number of papers on arxiv.org. Data from Zeta Alpha.

Evaluating Confidential Computing Solutions

There are a few important considerations to keep in mind when evaluating Confidential computing solutions. First, some of these tools – notably differential privacy and secure multi-party computation – are supporting components that tend to be used in conjunction with other technologies. Secondly, the performance and readiness of each of these technologies very much depends on the specific workload. As UC Berkeley Professor & Co-Founder of Opaque Systems Raluca Popa observed in a recent essay comparing TEE with the combination of HE and MPC

A persistent complaint against Homomorphic Encryption is that it can be four to five orders of magnitude slower than computing on unencrypted data. Alon Kaufman, CEO and Co-Founder, Duality Technologies, a startup commercializing HE for data science and advanced analytics, recently noted that they are beginning to see promising results for specific types of batch-oriented use cases: 

In the process of architecting and deploying technologies for confidential computing, you will need to choose providers you can trust. In the diagram below, the lower levels have fewer providers, making it easier to recover from any security or data breaches.

Figure 3: Confidential Computing techical stack.

Use Cases and Current Ecosystem

Here are some of the key uses cases that we are seeing in the market today, along with a representative sample of companies and solutions:

Figure 4: Representative sample of Confidential Computing companies and solutions.
(click HERE for full size version)

Closing thoughts

Which companies and sectors will be first to adopt Confidential Computing technologies? Every industry has data, but sectors differ according to level of regulatory oversight and level of maturity with regards to extracting insights from data. Privacy regulations like GDPR and CCPA apply across the board regardless of sector. However, the sensitivity of data varies across sectors, and some sectors have more sensitive data than others, and therefore are subject to additional regulations.

The early adopters of Confidential Computing will come from highly regulated sectors like financial services and healthcare. Highly regulated sectors will use Confidential Computing to enable cloud usage, collaboration, and compliance. Industries that are more mature as far as extracting insights from data will also be prime candidates for Confidential Computing solutions.  Other trends such as the newly introduced privacy policies by major mobile platforms will lead to a spike in interest in data exchanges, data clean rooms, and other related tools.

 

Synthetic Data as a tool for Confidential Computing will be used across industries. For now, other Confidential Computing tools like HE, TEE, FL still require more technical expertise and thus we believe adoption of such technologies will be more limited. In contrast, Synthetic Data is simpler to use and deploy, and offers benefits such as faster and cheaper data acquisition, which can potentially speed up the development of machine learning models and lead to more accurate predictions.

At the dawn of deep learning a decade ago, it was hard to envision that deep learning would impact every aspect of our life. We believe Confidential Computing is also a fundamental technology whose impact will cut across a wide range of industries and use cases.

Related Content: Other posts by Assaf Araki and Ben Lorica.


Assaf Araki is an investment manager at Intel Capital. His contributions to this post are his personal opinion and do not represent the opinion of the Intel Corporation. Intel Capital is an investor in Agita Labs, Duality, Fortanix, and Opaque. #IamIntel

Ben Lorica is principal at Gradient Flow. He is an advisor to several companies.


Subscribe to the Gradient Flow Newsletter:

Exit mobile version