How Confidential Computing Can Lead to a Secure Future of AI Development

How Confidential Computing Can Lead to a Secure Future of AI Development

PrimiHub is an open source privacy computing platform created by a team of cryptography experts. It focuses on sharing technology and content in privacy computing fields such as data security, cryptography, federated learning, and homomorphic encryption.

Advanced AI models such as machine learning and generative AI bring huge potential to accelerate medical research, boost business growth, and assist in the fight against crime. But if used incorrectly, these models can pose significant risks after the data is used to train and protect the model. To address this challenge, in October 2023, the U.S. Biden-Harris administration issued an executive order aimed at ensuring “the safe, secure, and trustworthy use of AI,” emphasizing the prioritization of privacy-enhancing technologies (PETs). ) to "protect user privacy."

Duality Platform: A Comprehensive Solution

Duality, the world's leading secure data collaboration platform, brings together a variety of software PETs and hardware PETs to provide a comprehensive solution to the privacy needs of querying, analyzing, and using sensitive information for model training. By simplifying the use of TEEs, Duality reduces the burden on administrators and developers, allowing teams to focus more on their core work. This comprehensive platform integrates the advantages of hardware and software to lay a solid foundation for data security.

The combination of hardware and software: powerful privacy protection

Duality is known for its expertise in software encryption data protection solutions, especially Fully Homomorphic Encryption (FHE). Hardware PETs—TEEs—have recently been introduced to provide additional hardware-level protection for data processing. Unlike traditional software solutions, TEEs use hardware security mechanisms to create a protected and isolated space within the CPU, making it safe from system and external threats. This combination of hardware and software provides a more powerful and comprehensive means for privacy protection.

Automated Security: Encryption Key Management in TEE

Within a TEE, critical operations such as cryptographic calculations and data processing are performed with a high degree of trust and integrity, using attestation mechanisms. However, managing these keys can be a complex and time-consuming process. Duality Technologies simplifies this process by automating encryption key management, allowing analysts and data scientists to focus on data analysis without worrying about intricate details. This automated security method provides users with a simpler and more efficient experience.

Use cases: medical facility, two research groups, structured and unstructured data

Duality conducted a proof-of-concept that demonstrated collaboration between three organizations: a medical center, a genetic research organization, and a pharmaceutical researcher. Through the Duality platform and TEE in the cloud environment, these organizations can jointly analyze structured and unstructured data, such as patient X-ray images, genetic information, while keeping patient identities private and secure. By combining Duality's solution with TEE, ensuring sensitive data remains encrypted throughout the entire process, privacy concerns about sharing sensitive information are addressed, enabling secure and collaborative analytics that were previously unachievable.

The combination of Duality's secure data collaboration platform and TEEs not only solves privacy and security challenges, but also opens up a secure future for AI development. The collaboration of hardware and software and automated security management provide users with a comprehensive, efficient and secure data processing experience. In the future, this will be a key cornerstone to promote sensitive data collaboration and AI model training, bringing more security and reliability to the development of all walks of life.

Original address: Secure AI Development & Training via Confidential Computing and TEEs
Original author: Omer Moran
Translated & organized: Open Privacy Computing & PrimiHub

Guess you like

Origin blog.csdn.net/PrimiHub/article/details/134687774