APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    Significance of Confidential Computing

    The technology sector must constantly stay one step ahead of attackers.  

    Significance of Confidential Computing

    By

    Apac CIOOutlook | Wednesday, November 09, 2022

    Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.

    Trusted execution environments shield proprietary data against the very cloud providers that host it.

    FREMONT, CA: The technology sector must constantly stay one step ahead of attackers. However, there is significant ambiguity regarding what is meant by confidential computing.

    It is described by AWS as a specific piece of hardware and firmware that divides an interior, often client data, from an exterior, usually a cloud provider. It has features of tiered zero trust, enabling businesses that use cloud providers to further segment data according to security requirements. It can safeguard data while it's being used and strike a balance between sharing and control over the data.

    An effort to develop more secure hardware-based execution environments is confidential computing. It is frequently used to safeguard data being used in many situations. Most people agree that securing data while at rest or in transit is simpler than doing so while it is being used. IEEE claims that the contradiction is the issue.

    The Confidential Computing Consortium established standards in 2020 by working on its Technical Advisory Council. Several businesses, including Meta (NASDAQ: META), Google (NASDAQ: GOOGL), Huawei, IBM (NYSE: IBM), Microsoft (NASDAQ: MSFT), and Tencent (HKG: 0700), provided their inputs.

    Confidential computing can reduce energy consumption by storing high-bandwidth or high-latency data, such as video, in the TEE rather than locally. It could also enable various businesses to share data sets without granting full access.

    The TEE is a secure portion of a CPU divided by embedded encryption keys that are only accessible by approved application code. The data remains invisible during calculation and decryption, not even to the operating system or hypervisor. It can be used to safeguard analytics operations or AI/ML algorithms in addition to proprietary business logic and apps.

    One of the objectives of cloud service providers who also offer confidential computing is to give their clients peace of mind regarding the cloud provider's access to secret data.

    The Google Cloud uses private virtual machines supported by 3rd generation AMD EPYC CPUs and secures encrypted virtualization extensions. The CPU generates and manages node-specific, dedicated keys, which are security keys generated within the hardware during node construction, to keep data encrypted in memory.

    Starting with IBM Cloud's Hyper Protect Services and Data Shield in 2018, IBM claims to be on the fourth generation of its secure computing offerings. A cloud hardware security module that has achieved FIPS 140-2 Level 4 certification is proudly included with Hyper Protect services. Both goods have ratings for laws, including HIPAA, GDPR, ISO 27K, and others.

    Additionally, IBM offers HPC Cluster, a section of its cloud service where clients can secure their clusters utilising their encrypted operating system and keep their key options. Customers may host a sizable number of Linux workloads inside a TEE to IBM's Secure Execution for Linux solution.

    Elastic Cloud Compute, an infrastructure-on-demand service that, by its very nature, necessitates some barriers and doors between Amazon and the user using the services, is supported by AWS's Nitro System. They employ several techniques to build those walls and doors. The Nitro System is one example; it features a unique security chip that cryptographically measures and certifies the system.

    The hardware-based security offered by this business is aided by Intel's (NASDAQ: INTC) Software Guard Extensions. They concentrated on offering TEE services designed for the government, financial, and healthcare sectors in 2021.

    More in News

    Impact of Digital Transformation on Retail

    Impact of Digital Transformation on Retail

    AI's Role in Apac's Digital Transformation Journey

    AI's Role in Apac's Digital Transformation Journey

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Salesforce Services in APAC: Empowering Digital Transformation Across the Region

    Enhancing Customer Satisfaction through Omni-Channel Payments

    Enhancing Customer Satisfaction through Omni-Channel Payments

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://www.apacciooutlook.com/news/significance-of-confidential-computing-nwid-9181.html