Concur News
  • Home
  • India
  • Startup
  • Regulation
  • Interview
  • Press Release
  • Login
June 30, 2025
No Result
View All Result
Concur News

Home » New Security Scheme Could Protect Sensitive Data During Cloud Computation

New Security Scheme Could Protect Sensitive Data During Cloud Computation

March 26, 2025
in News, Privacy
Reading Time: 3 mins read
New Security Scheme Could Protect Sensitive Data During Cloud Computation
Share on LinkedinShare on Whatsapp

Hospitals and organizations seeking cloud computing services for AI data analysis on sensitive records, like patient data, need guarantees of privacy during computation. Homomorphic encryption offers a solution by allowing computations without decrypting the data, keeping it secure.

Challenges in Implementing Homomorphic Encryption

Homomorphic encryption enables computations on encrypted data, keeping it secure and preventing unauthorized access. However, there are only a few methods available to achieve homomorphic encryption, and they are often so computationally intensive that they are impractical for real-world use. MIT researchers have developed a new theoretical approach to homomorphic encryption that relies on simpler, computationally lighter cryptographic tools. This technique combines two tools to create a “somewhat homomorphic” encryption scheme, which allows users to perform a limited number of operations on encrypted data without decrypting it. Unlike fully homomorphic encryption, which can handle more complex computations, this somewhat homomorphic approach enables limited operations, such as private database lookups and private statistical analysis.

Consent Foundation

The Road to Practical Homomorphic Encryption

While still theoretical, this approach offers a simpler structure that could make encryption more efficient in real-world applications. “The dream is that you encrypt your ChatGPT prompt and it can produce responses without seeing what you asked,” says Henry Corrigan-Gibbs, MIT professor and co-author of the research. This simpler method offers hope for more efficient encryption.

Balancing Security and Flexibility

Homomorphic encryption needs both high security and flexibility, which has made its development challenging. MIT’s somewhat homomorphic encryption scheme allows secure operations on encrypted data using specific functions that prevent excessive noise. This balance enables many additions and a few multiplications, keeping the noise manageable.

Combining Simple Tools for Powerful Encryption

The researchers combined a simple linear homomorphic encryption scheme with a theoretical assumption to expand its functionality. This allows for more complex operations, like additions and limited multiplications, by encrypting data into matrices and performing operations on those matrices.

Future Directions and Applications

While the current focus is on making this encryption scheme efficient enough to run on modern hardware, the researchers are optimistic about its potential. They plan to explore expanding the scheme to allow more complex operations, which could lead to a breakthrough in developing fully homomorphic encryption. “The exciting thing for us is that, when we put these two simple things together, something different happened that we didn’t expect. It gives us hope. What else can we do now?” says Corrigan-Gibbs.

This research, funded by companies like Apple, Google, Facebook, and Capital One, as well as the National Science Foundation (NSF) and other partners, promises to advance the field of secure cloud computation. If successful, this new encryption scheme could become a key enabler of private, secure data processing on cloud platforms in a wide range of industries.

Tags: DataData privacyData Protection

Related Posts

AT&T
Regulation

AT&T’s $177 Million Data Breach Settlement Gets Court Approval

June 23, 2025
Indian Banks Urged to Adopt AI, Privacy Under DPDP Act
India

Indian Banks Urged to Adopt AI, Privacy Under DPDP Act

June 21, 2025
TRAI Pilot
India

TRAI Teams Up with RBI and Banks to Launch Digital Consent Pilot Against Spam

June 17, 2025
Sentra DSAR
Press Release

Sentra Automates DSAR Responses to Help Companies Stay Compliant

June 13, 2025

RECOMMENDED NEWS

TCS Unveils SovereignSecure Cloud, DigiBOLT, and Cyber Defense Suite to Power India's Digital Future

TCS Unveils SovereignSecure Cloud, DigiBOLT, and Cyber Defense Suite to Power India’s Digital Future

2 months ago
europcar data breach

Data Breach at Europcar Exposes User Information and Configuration Files

3 months ago
Zerodha CEO Nithin Kamath Warns Users About Apps Misusing Personal Data Without Consent

Zerodha CEO Nithin Kamath Warns Users About Apps Misusing Personal Data Without Consent

2 months ago
ID Privacy

Data Safeguard India Unveils ID-PRIVACY

3 months ago

BROWSE BY TOPICS

AI AI Governance AI Privacy Apps Children privacy Compliance Consent Cross-Border Cybercrime Cyber security Data Data breach Data leak Data privacy Data Protection Data security Data Violation Digital DPDP DPDPA DPDP Act EU FBI Fines GDPR google Hack Hacked Industry Interview Investigation Investment Law Meity penalty Personal data Press Release Privacy RBI RTI Act Startek Tech giants Technology Training Trending

701, The Capital, BKC(E), Mumbai, India

Follow us on social media:

Categories

Categories Layout
  • Africa
  • America
  • India
  • Asia
  • Europe
  • Japan
  • Business
  • Events
  • Regulation
  • Law
  • News
  • Privacy
  • Startup
  • Technology
Categories Layout
  • Apps
  • Cybercrime
  • Data
  • Data Breach
  • Data Privacy
  • Data Protection
  • Digital
  • FBI
  • Investment
  • Law
  • Privacy
  • Tech Giants
  • DPDP
  • DPDPA

Harmonize Data Compliance

Footer with Animated Button
Effortlessly align your data compliance with Concur, ensuring seamless integration and robust adherence to regulatory standards.
BOOK A DEMO
  • About
  • Advertise
  • Careers
  • Home
  • Demo

© 2025 Concur - consent manager

Welcome Back!

OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • News
  • Business

© 2025 Concur - consent manager