Data Centric Secure Computing
Articles,  Blog

Data Centric Secure Computing


We live in an increasingly connected world, where massive amounts of data are shared around the globe. The ability to combine and analyze this data
is critical to our society and has led to breakthroughs in health, commerce, and science. At the same time, privacy and security risks prevent us from realizing the full potential of data sharing, with individual hackers,
criminal enterprises, and foreign adversaries aiming to violate our privacy and disrupt our way of life. The internet we have today is not equipped to secure the data needs of the future. When data leaves your laptop or your smart phone, it’s stored and processed by computers around the world. If any one of those computers is compromised, your data’s vulnerable to being stolen and
misused. We envision a new approach to securing information called data centric secure computing. Rather than relying on all the computers that touch your data to protect it, we want your data to protect itself automatically wherever it goes, so people can only use your data and learn about it in the ways you want them to. It’s like putting your data in a smart safe
that proactively protects your interests even when you’re not around. With data-centric secure computing, we envision each piece of data being locked away in a secure capsule. The secure capsule will contain an encoding of the data itself, provenance, or a record of where the
data has been in the past, and a policy describing how the data may be used or shared in the future. Advanced cryptography and trusted hardware will enable the data capsules to be shared, combined, and analyzed, all
without needing the capsules to be fully unlocked. Data capsules will be moved around using content-centric networking, which uses the data itself rather than network addresses to discover and route data. Finally, automated security analysis will ensure that policies are enforced anywhere the data gets used. Data-centric secure computing will transform the way we use data. What technological breakthroughs can you envision?

Leave a Reply

Your email address will not be published. Required fields are marked *