Confidential computing refers to a set of techniques and technologies designed to protect sensitive data while they are being processed, specifically during computation within microprocessors. The primary goal of confidential computing is to ensure that data remain encrypted and protected even when they are being accessed and manipulated by applications or services. By employing various security measures, such as encryption, secure enclaves, or hardware-based isolation, confidential computing aims to mitigate the risk of unauthorized access to sensitive information.
These methods prove particularly pertinent within the framework of European regulations concerning data protection and the use of shared IT infrastructures. Indeed, confidential computing may help mitigate the trust issue concerning third-party or foreign providers, notably those based in the United States.
This talk presented at Voxxed Days Brussels delve into the primary techniques, scrutinising their functionality, advantages and limits.
Languages: | English |
Author: | Fabien A. P. Petitcolas |
Category: | Presentation |
Date: | 2024/05 |
Platforms: | Windows |
License: | CC Attribution-NonCommercial-ShareAlike |
Keywords: | Security, Privacy |
Download: | Download |