Confidential Computing: Elevating Cloud Security and Privacy: Working toward a more secure and innovative future.
Mark RussinovichPublished in: ACM Queue (2023)
Keyphrases
- sensitive data
- security issues
- statistical databases
- cloud computing
- security concerns
- confidential information
- privacy preserving
- secure multiparty computation
- security mechanisms
- protection mechanisms
- information security
- sensitive information
- security measures
- security properties
- security threats
- confidential data
- security requirements
- identity management
- data confidentiality
- security services
- data privacy
- rfid systems
- data storage
- personal data
- smart card
- data security
- encrypted data
- security analysis
- data perturbation
- authentication protocol
- electronic payment
- data sharing
- third party
- mutual authentication
- user privacy
- security management
- security level
- access control
- cryptographic protocols
- personal information
- inference control
- key management
- security protocols
- data protection
- privacy protection
- cloud storage
- data management
- privacy issues
- homomorphic encryption
- privacy preserving data mining
- privacy concerns
- preserving privacy
- electronic transactions
- disclosure risk
- encryption scheme
- data encryption
- encryption key
- intrusion detection
- private information
- security and privacy issues
- original data
- network security
- information leakage
- privacy requirements
- digital signature
- security risks