Knowledge Base

The Analytics and AI Challenge in Confidential Computing

Enclave innovation protects data from attack and unauthorized access, but it also presents immense challenges and obstacles to performing analytics and machine learning within and across teams. The inability to securely share data or analyze data that is owned by multiple parties has resulted in organizations having to restrict data access, eliminate data sets or …

The Analytics and AI Challenge in Confidential Computing Read More »

pexels-lisa-fotios-1055068

How to Defend Against Side-Channel Attacks on SGX

Our last blog post explained the concept of secure enclaves. In this blog post, we will specifically focus on hardware enclaves and discuss just how secure they are.  Introduction But first, a refresher on hardware enclaves for our new readers. Hardware enclaves provide an isolated environment for code and data within an untrusted machine, where …

How to Defend Against Side-Channel Attacks on SGX Read More »

Secure Enclaves are like water-locked castels.

What are Secure Enclaves?

Some of the biggest barriers to cloud adoption are concerns about security, data loss/ leakage, and the associated legal and regulatory concerns with storing and processing data off-premises1. Several cloud data breach incidents in recent years indicate that these concerns are warranted as a result of constant insider and outsider threats. The challenge with Infrastructure …

What are Secure Enclaves? Read More »

Federated Learning vs. Secure Collaborative Learning

Federated Learning vs. Secure Collaborative Learning

New techniques in analytics and machine learning offer the ability to process ever-increasing amounts of data, but access to such data has lagged far behind the technological advances in data processing. High-value data is often split across multiple organizations and access to it is encumbered by business competition and regulatory constraints. For example, banks wish …

Federated Learning vs. Secure Collaborative Learning Read More »

Run Spark SQL on Encrypted Data

How to Run Spark SQL Queries on Encrypted Data

TL;DR: We are excited to present Opaque SQL, an open-source platform for securely running Spark SQL queries on encrypted data-in-use. Originally built by top systems and security researchers at UC Berkeley, the platform uses hardware enclaves to securely execute queries on private data in an untrusted environment. Opaque SQL partitions the codebase into trusted and untrusted sections to improve runtime …

How to Run Spark SQL Queries on Encrypted Data Read More »

Secure computation: Homomorphic encryption or hardware enclaves

Secure Computation: Homomorphic Encryption or Hardware Enclaves?

Secure computation has become increasingly popular for protecting the privacy and integrity of data during computation. The reason is that it provides two tremendous advantages. The first advantage is that it offers “encryption in use” in addition to the already existing “encryption at rest” and “encryption in transit”. The “encryption in use” paradigm is important …

Secure Computation: Homomorphic Encryption or Hardware Enclaves? Read More »