Technology

Confidential Computing is the next big thing for IBM and cloud security

Trillions of GBs of data is being produced every single day all over the world. So where is all this data going? It is essentially being stored in the cloud, hosted by giants like Google, Microsoft, etc. If large corporations need to use their data, they usually bring it down from the cloud and process it on their local machine after decrypting it.

This is a huge bottleneck as the data is downloaded from the cloud and decrypted each time it needs to be used. As Fahmida at IEEE has explained, data can be protected at 3 stages; at rest, in transit, and while being used. Most data is protected at rest through encryptions etc. which is very slow.

This also stops corporations from using the cloud to process their data. The data would have to be decrypted in the cloud before being used which is a huge security risk. The answer? Confidential Computing.

So what is Confidential Computing?
Confidential computing is the protection of data while it is being used. This means that data is stored in encrypted format in the memory and only decrypted while it goes to the CPU. This requires the use of special hardware that automatically encrypts and decrypts data before and after it is used.

Why are IBM and others investing heavily in this?
The reason is pretty simple. Your data is sensitive and you produce a lot of it but you don’t have the processing power to analyze it. You don’t want to give it to Google for example as they might use it for themselves. Confidential Computing will allow users with sensitive data to easily use other machines to meet their needs. No security risks, no data leaks, nothing.

This opens up a whole avenue for giants like IBM, Google, Intel, etc. As IBM’s CTO said,
This is part of what we view as unlocking the next generation of cloud adoption. It’s very much about getting clients to look not just at the first really obvious consumer mobile app kind of things to do on a public cloud. There’s a second generation of cloud workload considerations that are more at the core of these businesses that relate to more sensitive data. That’s where security needs to be considered upfront in the overall design.”

Sponsored
TechJuice

Pakistan's premier website covering everything about Technology, Startups and Entrepreneurship! Email: editors@techjuice.pk

Leave a Comment
Share
Published by
TechJuice

Recent Posts

Indian Army Granted Authority to Directly Takedown Social Media Content

The Indian Army has been granted direct authority to manage social media content concerning its…

8 hours ago

NUST Achieves Global Recognition with 43 Researchers Among World’s Top 2% Scientists

In an extraordinary accomplishment for Pakistani academia, 43 researchers from the National University of Sciences…

9 hours ago

Khyber Pakhtunkhwa Govt Ready to Acquire PIA with Bid Exceeding Rs10bn

The Khyber Pakhtunkhwa (KP) government has officially informed the federal government of its intention to…

10 hours ago

PTA Cautions Public on Illegal and Unlicensed Forex Trading Platforms

The Pakistan Telecommunication Authority (PTA) has issued a stern advisory, warning citizens against investing in…

10 hours ago

Record Emigration: Economic Instability Forces Pakistan’s Best and Brightest to Depart

Economic challenges are prompting skilled workers to leave Pakistan, resulting in a significant talent drain…

13 hours ago

Russia’s Fine on Google Exceeds World’s Economy

A Russian court has fined Google for blocking state-run media channels on YouTube, imposing a…

1 day ago