This PET technique ensures that only the intended recipients can access and read data.
What is Encryption?
The process of sharing data securely among different organizations using PETs.
What is Secure Data Sharing?
An EU regulation that enhances data protection and privacy for individuals.
What is the General Data Protection Regulation (GDPR)?
Protects data in use by performing computation in a hardware-based, attested Trusted Execution Environment
What is Confidential Computing?
A novel PET that has recently been developed for real-time data encryption.
What is Quantum Encryption?
This PET encrypts data in such a way that it can be computed on without revealing its contents.
What is Homomorphic Encryption?
A technology that enables secure data sharing without exposing the actual data.
What is Data Masking?
The concept of ensuring data privacy compliance through PETs according to this regulation.
What is GDPR Compliance through PETs?
This early work on privacy-preserving computation by Rivest, Adleman, and Dertouzos introduced concepts central to what would later be known as Confidential Computing.
What is On Data Banks and Privacy Homomorphisms
This technology applies PETs to enhance blockchain privacy and security.
What is Zero-Knowledge Proofs?
A framework or environment that isolates computation to protect sensitive data in use.
What is a Trusted Execution Environment?
PETs used to create a secure environment for collaborative AI and machine learning.
What is Federated Learning?
This term describes the minimum amount of information needed to uniquely identify an individual within a dataset, challenging assumptions about anonymized data's privacy.
What is Unicity?
This form of encryption allows for computations on encrypted data without needing to decrypt it first, complementing Confidential Computing strategies.
What is Homomorphic Encryption?
An emerging field combining PETs with this type of computing to secure data processing.
What is Edge Computing with PETs?
A PET that allows multiple parties to compute a function over their inputs while keeping them private.
What is Secure Multi-Party Computation?
This PET technique ensures the privacy of data contributors in collaborative settings.
What is Privacy-Preserving Aggregation?
An international standard that specifies techniques for privacy and data protection.
What is ISO/IEC 27701?
The year when the first significant breakthrough in Fully Homomorphic Encryption, a key underpinning of Confidential Computing, was achieved.
What is 2009?
A project focusing on the development of PETs for securing IoT devices.
What is Secure IoT Frameworks?
There are three different threat models to consider with PETS: Data in rest, transit and...
What is Data in Use?
The biggest challenge in implementing PETs for data collaboration across industries.
What is Interoperability?
The regulatory body in the EU known for publishing guidelines on the use of PETs.
What is the European Data Protection Board (EDPB)?
This process in Confidential Computing verifies the integrity of the computing environment to ensure it hasn't been tampered with.
What is Remote Attestation?
The latest trend in PETs aiming to revolutionize data privacy in cloud computing environments.
What is Confidential Cloud Computing?