IBM secures cloud computing with encryption breakthrough

In the future, businesses could be able to fully analyse encrypted data without any threat to privacy, which could be very useful in the cloud.

IBM has claimed that one of their researchers has solved a problem that has challenged public-key encryption experts for decades how to analyse encrypted data without sacrificing confidentiality.

The company said that the breakthrough could strengthen cloud computing security, as it would enable a cloud computing vendor to "perform computations" on business data such as looking for sales patterns without exposing the original private data.

IBM researcher Craig Gentry formulated the solution, which is called "privacy homomorphism" or "fully homomorphic encryption". He was said to have used a mathematical object called an "ideal lattice" to do it.

IBM said the system could be used to identify spam in encrypted email, protect electronic medical records, and let users look at information from search engines without feeling their privacy was threatened.

"Fully homomorphic encryption is a bit like enabling a layperson to perform flawless neurosurgery while blindfolded, without later remembering the episode," claimed Charles Lickel, vice president of IBM Software Research in a statement.

"We believe this breakthrough will enable businesses to make more informed decisions, based on studied analysis, without compromising privacy," he added.

Click here to read how security is holding back cloud computing.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021