Helical founder Eric Hess discusses how homomorphic encryption could change the way data is transferred and processed securely.
While advances in data analytics have enabled businesses to gain expanded insight into large structured and unstructured datasets, these advances have come with increased privacy and misappropriation risks.
Exercising greater control over the life cycle of data and confidentiality agreements has mitigated these risks but outsourcing of sensitive or regulated components of data processing to third parties is still widely viewed as fraught with risk.
If all sensitive data or data processes and algorithms could be shared with or processed by any third party (including competitors) subject to the providers controls, however, it would open up unimagined avenues of enterprise collaboration, specialisation and integration.
Homomorphic encryption solves for this significant gap and, while commercial viability is still a challenge, compelling use cases are emerging. In the coming years, any organisation endeavouring to become a centre of excellence in big data analytics will have no choice but to embrace homomorphic encryption.
Encryption is a digital safe where information is secured while locked inside. Plaintext data is converted to ciphertext using an algorithm that is sufficiently complicated to make the data unreadable without a decryption key. It can be stored and transmitted in this format and recipients can decrypt it, provided they have the key. Once encrypted data is needed for analysis, compliance or any other use case, it must be converted back to plaintext, which can sacrifice security.
Homomorphic encryption addresses this core weakness by allowing analysis on data in its ciphertext form. Craig Gentry, an early homomorphic encryption innovator, described the process as manipulating the contents of a locked box through gloves that are accessed through ports on the outside of the box.
One party places and locks contents in the box for a third party to manipulate without seeing what they are working on. The box is returned to the controller when the processor has completed the assigned task and custody is never surrendered.
Gentrys dissertation made homomorphic encryption attainable with one major barrier: computational overhead. Processing ciphertext creates a lot of overhead as the calculations are performed bit by bit. IBM has improved processing overhead, claiming it now runs 75 times faster than before, and a wide range of alternative schemes have further improved processing speeds.
Spurred by the collaborative models being deployed in connection with potential Covid-19 vaccines and treatments, homomorphic encryption will likely experience the highest relative rates of adoption and innovation in clinical research.
Homomorphic encryption can provide a mechanism for the life sciences industry to continue protecting intellectual property while leveraging the collaborative benefits from Covid-19 in other medical research.
Use cases will also be compelling for financial services, where data analytics defines the success or failure of algorithms and is becoming increasingly important as relative high-frequency trading advantages become more elusive. National security and critical infrastructure also provide early compelling use cases.
Encrypted processing will create new opportunities, applications and even industries
New opportunities will be created for data controllers (those with custody of data) to engage with data processors, as well as collaborative opportunities where the parties are both controllers and processors of data. Collaborative opportunities not only offer the benefits of specialisation but the promise of data collectives as well, where members will be able to define terms of use and disclosed outputs among its members.
Data collectives are not a new concept to securities markets. For example, in 2005 the US Securities and Exchange Commission mandated regulated security markets to act jointly to disseminate consolidated information on quotations and transactions in securities markets.
Now, homomorphic encryption could empower competitive financial firms to not only provide alternatives to these sources, but innovate collectively to create their own proprietary market data products.
For all the promise of machine learning, the process of training and tuning machine learning applications requires big datasets.
Industry collectives could aggregate encrypted data and assign processes to collective members or vendors. Not only would this permit greater specialisation, but the collective dataset would accelerate machine learning in a way that additional computing power or PhDs cannot.
A recent IBM case study leveraging machine learning on a homomorphically encrypted database sought to predict whether bank customers would likely need a loan in the near future. A machine learning algorithm selected the most relevant variables for predicting loan status. The algorithm was trained on both encrypted and unencrypted data to measure accuracy and efficiency. The result was a near identical rate of accuracy and a manageable level of slowdown a persuasive positive indicator for the arrival of homomorphic encryptions commercial viability.
Homomorphic encryption will also accelerate the movement of big data analytics to cloud environments. Organisations leveraging big data have been reticent about cloud security since downloading big datasets from the cloud for processing can be impractical.
On the other hand, performing data processing for their most sensitive data in the cloud also requires storing the data encryption key in the cloud, making an organisations security only as strong as the cloud environment. With homomorphic encryption, processing can occur in ciphertext form in the cloud with encryption keys stored offline.
Many initiatives endeavouring to harness the power of big data have struggled with resource limitations, current technologies and regulations. Take, for example, financial regulators who struggle with the burdens of monitoring financial audit trails across multiple markets, asset types and participants.
Aggregating and disseminating this data to regulators is critical for surveillance, but creates a treasure trove of highly sensitive, unencrypted data while it is processed, and this occurs across multiple regulators.
This big data problem and the risk that this information will be used to engage in manipulative trading or even destabilise financial markets will only continue to grow unless encryption is deployed throughout the datas life cycle. In fact, regulators only require audit trails related to red flags that their surveillance algorithms identify, which can all be done in a fully encrypted format.
The competing concerns of privacy regulation and the value of data analytics is also an issue that the healthcare industry has struggled with.
Fragmentation of health information is compounded by privacy concerns, which are a significant roadblock to data sharing and has prevented the integration of health data that could facilitate better health outcomes.The utility of digital health information systems could be greatly enhanced by the deployment of homomorphic encryption.
Encrypted processing will create new opportunities, applications and even industries by greatly minimising intellectual property and regulatory concerns. It may even turn competitors into collaborators.
Homomorphic encryption will also force a re-examination of baseline assumptions related to confidentiality and security.How will restrictions on disclosure apply to encrypted processing by third parties? What are appropriate access controls where the entire life cycle of data is encrypted?What is reasonable security for processors of such data?
Privacy regulation will need to be re-examined in light of personal information being mined in an encrypted format. If an organisation is prohibited from sharing or selling data, what are the legal implications of their sharing and processing encrypted data that is never exposed?
Lastly and importantly, how will we know that the technologies we are deploying to accomplish not only homomorphic encryption but homomorphically encrypted processes are complying with the applicable laws, standards and obligations? Solutions will need to be auditable by design.
Homomorphic encryption is about more than big data. It is about solving for trust with tools that have never been available before and for which no similar workaround existed.
By Eric Hess
Eric Hess is the founder ofHess Legal Counsel and Helical. Hess Legal advises securities and digital asset firms on contract, security and privacy, governance, technology licensing and financing issues. Helical offers a cybersecurity-as-a-service platform.
Read more:
Could homomorphic encryption be the solution to big data's problem? - Siliconrepublic.com
- All About Encryption Backdoors - Hashed Out by The SSL Store - Hashed Out by The SSL Store - January 25th, 2021
- Global Database Encryption Market Snapshot Analysis and Increasing Growth Demand by Forecast To 2025 The Courier - The Courier - January 25th, 2021
- Hardware Encryption Market worth $313 million by 2025 - Exclusive Report by MarketsandMarkets - PRNewswire - January 25th, 2021
- Encryption Software Market to Reach USD 24.94 billion by 2027; Surging Cyber Security Threats to Improve Sales Prospects, states Fortune Business... - January 25th, 2021
- Facebook has accepted that encryption will damage the child protection program from its platform - Digital Information World - January 25th, 2021
- Facebook admits encryption will harm efforts to prevent child exploitation - The Guardian - January 25th, 2021
- Disk Encryption Market Analysis And Demand With Forecast Overview To 2027 - KSU | The Sentinel Newspaper - January 25th, 2021
- Following a Year of Privacy Worries and Security Breaches, Ring Implements End-to-End Encryption - CPO Magazine - January 25th, 2021
- Encryption Key Management Market 2021 to Perceive Biggest Trend and Opportunity by 2028 - KSU | The Sentinel Newspaper - January 25th, 2021
- Outlook on the Endpoint Encryption Market to 2025 by Application, End-user an - Business-newsupdate.com - January 25th, 2021
- Covid-19 Positive Impact on Encryption Software Market 2021-2027 |Gemalto (Amsterdam,Netherlands), Symantec (California,US), Dell (Texas,US), Sophos... - January 25th, 2021
- Ring adds end-to-end video encryption to its doorbells and security cameras at CES 2021 - CNET - January 14th, 2021
- Encrypted Phones iPhone and Android Encryption - Reader's Digest - January 14th, 2021
- Millions Flock to Telegram and Signal as Fears Grow Over Big Tech - The New York Times - January 14th, 2021
- Signal, the encrypted messaging app and WhatsApp alternative, explained - Vox.com - January 14th, 2021
- Heres why Telegram does not offer end-to-end encryption by default - The Indian Express - January 14th, 2021
- Mobile Encryption Market Structure, Industry Inspection, and Forecast 2025 - Business-newsupdate.com - January 14th, 2021
- Comprehensive Report on Email Encryption Market 2020 | Size, Growth, Demand, Opportunities & Forecast To 2030 - KSU | The Sentinel Newspaper - January 14th, 2021
- The World's Only Processor Family with Full Memory Encryption* - PCWorld - January 14th, 2021
- What is Signal? The basics of the most secure messaging app. - Mashable - January 14th, 2021
- WhatsApp chats are encrypted so how will Facebook use chat data for ads? This is how - India Today - January 14th, 2021
- Encryption Software Market Current and Future Industry Trends, 2020-2025 - AlgosOnline - January 14th, 2021
- What Is Signal, and Why Is Everyone Using It? - How-To Geek - January 14th, 2021
- Data Encryption Market Analysis and In-depth Research on Size, Trends, Emerging Growth Factors and Forecasts 2026 - Murphy's Hockey Law - January 14th, 2021
- Elon Musk says to use Signal instead of Facebook. What to know about the messaging app - CNET - January 10th, 2021
- Global Document Encryption Software Market 2020 Industry Analysis, Key Drivers, Business Strategy, Opportunities and Forecast to 2025 The Sentinel... - January 10th, 2021
- Encryption Software Market Segmentation and Analysis by Recent Trends, Development and Growth by Regions to 2026 - Farming Sector - January 10th, 2021
- Homomorphic Encryption Market 2020 | COVID-19 Impact With Top Key Players, Trends, Overview, Insights And Outlook 2027 : Cosmian, CryptoExperts,... - January 10th, 2021
- Global Email Encryption Market Expected to reach highest CAGR by 2025 : Hewlett-Packard, Symantec Corporation, Cisco Systems, Mcafee (Intel), Trend... - January 10th, 2021
- Homomorhpic Encryption Market Latest Innovations, Analysis, Business Opportunities, Overview, Component, Industry Revenue and Forecast - LionLowdown - January 10th, 2021
- Homomorphic Encryption Market Forecast 2021-2027, Latest Trends and Opportunities|Microsoft (US), IBM Corporation (US), Galois Inc (US) - Farming... - January 10th, 2021
- Are We Heading Towards EU Legislation Banning End-to-End Encryption? - Lexology - December 29th, 2020
- Encryption Software Market Trending Technologies, Industry Growth, Share, Opportunities, Developments And Forecast - LionLowdown - December 29th, 2020
- Signals famous encryption may have been cracked - TechRadar - December 29th, 2020
- AES Encryption Software Market 2021: Comprehensive Analysis and Growth Forecast - NeighborWebSJ - December 29th, 2020
- Encryption, zero trust and the quantum threat security predictions for 2021 - BetaNews - December 29th, 2020
- Encryption Software Market By Business Analysis, Industry Types, Demand, Capacity, Applications, Services, Innovations and Forecast 2025 - Farming... - December 29th, 2020
- Encryption Software Market Size 2020 by Top Key Players, Global Trend, Types, Applications, Regional Demand, Forecast to 2027 - LionLowdown - December 29th, 2020
- How to Securely Send Sensitive Information over the Internet - TechBullion - December 29th, 2020
- In 2020, Congress Threatened Our Speech and Security With the EARN IT Act - EFF - December 29th, 2020
- Encryption Key Management Market Key Trends and how do they Impact the Specific Regions - NeighborWebSJ - December 29th, 2020
- The ACLU Is Suing For Info On The FBI's Encryption Breaking Capabilities - Gizmodo - December 29th, 2020
- Encrypting data is the key to a peaceful New Year (Includes interview) - Digital Journal - December 29th, 2020
- Proton's Calendar Platform With End-to-End Encryption Now Available as an Android App - News18 - December 29th, 2020
- Encryption Software Market 2020: COVID19 Impact on Industry Growth, Trends, Top Manufacturer, Regional Analysis and Forecast to 2027 - The Monitor - December 29th, 2020
- The Same U.S. Government That Wants To Weaken Our Encryption Just Got Massively Hacked - Reason - December 15th, 2020
- How to Enable End-to-End Encryption in Google Messages - Lifehacker - December 15th, 2020
- Ransomware gangs are getting faster at encrypting networks. That will make them harder to stop - ZDNet - December 15th, 2020
- UK has not ordered 'backdoor access' to WhatsApp messages - but could issue injunction against Facebook's encryption plans - Sky News - December 15th, 2020
- From the bottom of the sea rose a piece of encrypted history. What were the Nazi Enigmas? - The Indian Express - December 15th, 2020
- Global Cloud Encryption Software Market To Witness Huge Gains Over 2020-2026 - The Courier - December 15th, 2020
- Google Messages End-to-End Encryption Guide: How It Works on Android - Tech Times - December 15th, 2020
- Facebooks encryption could prevent MI5 and police from stopping terror attacks and child abuse - Telegraph.co.uk - December 15th, 2020
- S'pore seizes $5.3m in illicit funds linked to Canadian network used by crime syndicates - The Straits Times - December 15th, 2020
- Encrypted messaging could increase child abuse cases, report warns - E&T Magazine - December 9th, 2020
- A Balanced DNS Information Protection Strategy: Minimize at Root, TLD; Encrypt When Needed Elsewhere - CircleID - December 9th, 2020
- Protecting consumer data is leading driver for encryption in Middle East: report - Gulf Business - December 9th, 2020
- Insights on the Cloud Encryption Software Market 2020-2024: COVID-19 Industry Analysis, Market Trends, Market Growth, Opportunities and Forecast 2024... - December 9th, 2020
- Commercial Encryption Software Market Trends, Growth, Analysis, Opportunities and Overview by 2026 - Murphy's Hockey Law - December 9th, 2020
- Does opening a 'back door' to encrypted communications create a whole new raft of problems? How can firms promise privacy if there is official access?... - December 9th, 2020
- Enigma encryption machine used by Nazis in World War II found on bottom of ocean - ABC News - December 9th, 2020
- Encryption Software Market 2020 | Latest Trend, Swot Analysis, Covid-19 Impact And Forecast - The Haitian-Caribbean News Network - December 9th, 2020
- Data Encryption Market Size with Business Opportunity, Challenges, Standardization, Competitive Intelligence and Regional Analysis - The... - December 9th, 2020
- COVID-19 Update: Global Encryption Software Market is Expected to Grow at a Healthy CAGR with Top players: Dell , Eset , Gemalto , IBM , Mcafee , etc.... - December 9th, 2020
- SSL-based threats remain prevalent and are becoming increasingly sophisticated. - The CyberWire - December 9th, 2020
- What Is the Signal Encryption Protocol? - WIRED - November 30th, 2020
- Data Protection | The Pros and Cons of End-to-End Encryption - DIGIT.FYI - November 30th, 2020
- Encryption Software Market Overview, Growth, Types, Applications, Dynamics, Companies, Regions, & Forecast to 2026 - The Haitian-Caribbean News... - November 30th, 2020
- Encryption Software Market to Witness Astonishing Growth by 2027 | Dell , Eset , Gemalto and more - Cheshire Media - November 30th, 2020
- EU targets end-to-end encryption tools after rise in terror attacks - DIGIT.FYI - November 30th, 2020
- European Legislators Move to Eliminate End-to-End Encryption in Messaging Services Following Terror Attacks - Digital Information World - November 30th, 2020
- Facebook urged to end encryption to help cops stop paedophiles using app - The Sun - November 30th, 2020
- Inside the French governments mission to develop an encrypted messaging platform - NS Tech - November 30th, 2020
- Hardware-based Full Disk Encryption Market Size, Key Manufacturers, Demand, Application And Opportunities By 2027 - The Haitian-Caribbean News Network - November 30th, 2020
- The tech and security backends that keep your data safe - Business MattersBusiness Matters - November 30th, 2020
- Encryption Software Market Expected to Boost the Global Industry Growth in the Near Future - Cheshire Media - November 30th, 2020
- Commercial Encryption Software Market Will Generate Record Revenue by 2025 - The Haitian-Caribbean News Network - November 30th, 2020
- Symmetric Encryption Algorithms: Live Long & Encrypt - Hashed Out by The SSL Store - Hashed Out by The SSL Store - November 24th, 2020
- Google plans to test end-to-end encryption in Android messages - TechCrunch - November 24th, 2020
- Google Messages Set to Roll Out End-to-End Encryption - Infosecurity Magazine - November 24th, 2020
Recent Comments