Concur News
  • Home
  • India
  • Startup
  • Regulation
  • Interview
  • Press Release
  • Login
May 13, 2025
No Result
View All Result
Concur News

Home » New Security Scheme Could Protect Sensitive Data During Cloud Computation

New Security Scheme Could Protect Sensitive Data During Cloud Computation

March 26, 2025
in News, Privacy
Reading Time: 3 mins read
New Security Scheme Could Protect Sensitive Data During Cloud Computation
Share on LinkedinShare on Whatsapp

Hospitals and organizations seeking cloud computing services for AI data analysis on sensitive records, like patient data, need guarantees of privacy during computation. Homomorphic encryption offers a solution by allowing computations without decrypting the data, keeping it secure.

Challenges in Implementing Homomorphic Encryption

Homomorphic encryption enables computations on encrypted data, keeping it secure and preventing unauthorized access. However, there are only a few methods available to achieve homomorphic encryption, and they are often so computationally intensive that they are impractical for real-world use. MIT researchers have developed a new theoretical approach to homomorphic encryption that relies on simpler, computationally lighter cryptographic tools. This technique combines two tools to create a “somewhat homomorphic” encryption scheme, which allows users to perform a limited number of operations on encrypted data without decrypting it. Unlike fully homomorphic encryption, which can handle more complex computations, this somewhat homomorphic approach enables limited operations, such as private database lookups and private statistical analysis.

Consent Foundation

The Road to Practical Homomorphic Encryption

While still theoretical, this approach offers a simpler structure that could make encryption more efficient in real-world applications. “The dream is that you encrypt your ChatGPT prompt and it can produce responses without seeing what you asked,” says Henry Corrigan-Gibbs, MIT professor and co-author of the research. This simpler method offers hope for more efficient encryption.

Balancing Security and Flexibility

Homomorphic encryption needs both high security and flexibility, which has made its development challenging. MIT’s somewhat homomorphic encryption scheme allows secure operations on encrypted data using specific functions that prevent excessive noise. This balance enables many additions and a few multiplications, keeping the noise manageable.

Combining Simple Tools for Powerful Encryption

The researchers combined a simple linear homomorphic encryption scheme with a theoretical assumption to expand its functionality. This allows for more complex operations, like additions and limited multiplications, by encrypting data into matrices and performing operations on those matrices.

Future Directions and Applications

While the current focus is on making this encryption scheme efficient enough to run on modern hardware, the researchers are optimistic about its potential. They plan to explore expanding the scheme to allow more complex operations, which could lead to a breakthrough in developing fully homomorphic encryption. “The exciting thing for us is that, when we put these two simple things together, something different happened that we didn’t expect. It gives us hope. What else can we do now?” says Corrigan-Gibbs.

This research, funded by companies like Apple, Google, Facebook, and Capital One, as well as the National Science Foundation (NSF) and other partners, promises to advance the field of secure cloud computation. If successful, this new encryption scheme could become a key enabler of private, secure data processing on cloud platforms in a wide range of industries.

Tags: DataData privacyData Protection

Related Posts

Texas
America

Google will pay Texas $1.4 billion to settle claims the company collected users’ data without permission

May 12, 2025
EasemyTrip
India

EaseMyTrip Founder Warns of Security Risks from China-Linked Travel Apps

May 12, 2025
Michigan
LAW

Michigan Attorney General Sues Roku for Alleged COPPA Violations

May 10, 2025
EIB
Europe

EDPS Blocks EIB’s Data Transfer to India Over Privacy Law Concerns

May 10, 2025

RECOMMENDED NEWS

China Regulates Facial Recognition Technology

China Regulates Facial Recognition Technology

2 months ago
Data Privacy and AI in India

Data Privacy and AI in India: Addressing the Challenges

1 month ago
insurance company

Is it Harassment or a Privacy Violation? Insurance Company Demands Home Photos and Google Location for Claim Approval

1 month ago
NIST Updates Privacy Framework with New Changes to Address Privacy and Cybersecurity Risks

NIST Updates Privacy Framework with New Changes to Address Privacy and Cybersecurity Risks

4 weeks ago

BROWSE BY TOPICS

AI AI Governance AI Privacy Children privacy Compliance Consent Cross-Border Cybercrime Cyber security Data Data breach Data leak Data privacy Data Protection Data Safeguard Data security Data Violation Digital DPDP DPDPA DPDP Act EU Fines Fraud GDPR Generative AI Hack Hacked Industry Interview Investigation Law penalty Personal data PHI PII Press Release Privacy RBI RTI Act Startek Tech giants Technology Training Trending

Trimtab Innovation Pvt. Ltd 701, The Capital, BKC(E), Mumbai, India

Follow us on social media:

Categories

Categories Layout
  • Africa
  • America
  • India
  • Asia
  • Europe
  • Japan
  • Business
  • Events
  • Regulation
  • Law
  • News
  • Privacy
  • Startup
  • Technology
Categories Layout
  • Apps
  • Cybercrime
  • Data
  • Data Breach
  • Data Privacy
  • Data Protection
  • Digital
  • FBI
  • Investment
  • Law
  • Privacy
  • Tech Giants
  • DPDP
  • DPDPA

Harmonize Data Compliance

Footer with Animated Button
Effortlessly align your data compliance with Concur, ensuring seamless integration and robust adherence to regulatory standards.
BOOK A DEMO
  • About
  • Advertise
  • Careers
  • Home
  • Demo

© 2025 Concur - consent manager

Welcome Back!

OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
error: Content is protected !!
No Result
View All Result
  • Home
  • News
  • Business

© 2025 Concur - consent manager