Thursday, February 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Top 5 confidential computing uses in healthcare

Researcher by Researcher
November 28, 2022
in Cybersecurity
0
Top 5 confidential computing uses in healthcare
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Big data meets private data in a perfect storm for healthcare. Confidential computing providers say they’ll make the cloud safer for medical data.

A medical professional types on a computer with medical equipment in the foreground.
Image: National Cancer Institute/Unsplash

Healthcare information is personal and private. For both legal and ethical reasons, it’s critical to keep it that way. Government regulations like HIPAA have been in the headlines a lot lately, but tech companies are still exploring how to implement them.

Many companies try to package privacy in different ways. Confidential computing is an initiative that often ends up spoken of in the same breath as patient and personally identifiable information privacy and has become a new frontier for cloud providers.

SEE: Hiring Kit: Cloud Engineer (TechRepublic Premium)

Confidential computing aims to protect data while it’s in transit, in use and at rest, combating attackers who use memory scraping to infiltrate data in use. It might involve artificial intelligence or machine learning and can work with traditional servers or virtual machines, but the definition is broad enough to include many different tools and approaches. Often it involves a trusted execution environment which walls data off from outside influence.

Confidential computing also allows AI algorithm developers to share large data sets without sharing IP. That is often where it crosses over with healthcare, as patient information and large, shared black box data sets would otherwise be a tricky combination. Confidential computing has several applications within the healthcare field.

Top 5 healthcare use cases for confidential computing

1. Protecting against cyberattacks

In general, confidential computing is a new way of thinking about protecting data. Protecting private patient information is a top priority for hospitals and other healthcare organizations in order to maintain trust and meet government regulations.

Cloud: Must-read coverage

Meanwhile, attackers have started to target data on the move. Microsoft Azure demonstrates how TLS encryption and attestation are used to protect patient information, run machine learning on sensitive information or perform algorithms on encrypted datasets from many sources without opening doors for attackers. It reduces the attack surface visible from outside.

Fortanix demonstrates confidential computing’s use in healthcare security with its adoption of Intel Software Guard Extensions. This creates a hardware-based TEE or memory “enclave” around the computer where the AI workload is isolated and processed. This enclave exists entirely separately from the host operating system, hypervisor, root user and peer applications running on the same processor.

We’ll have more to say about AI later, but confidential computing is also being applied to get ahead of attacks on IoT medical devices and cloud data.

2. Meeting industry regulations

Confidential computing services are well aware of the many industry regulations around customer data. For example, HIPAA lays out specific rules for cloud computing.

IBM says they baked this understanding into confidential computing from the beginning. Their Hyper Protect iOS SDK for Apple CareKit encrypts data for the open-source healthcare app development platform. It can be used for dynamic care plans, tracking symptoms and connecting to care teams, all of which might involve moving sensitive PII from one place to another in the course of healthcare work.

3. Securing AI research

Healthcare workers can use AI to assist nurses and doctors in day-to-day tasks, analyze large amounts of data to improve early disease detection with pattern recognition, monitor heart conditions and train healthcare professionals. Naturally, there is a concern about creating huge volumes of data in a very private setting. Confidential computing can help with that.

Recently, Microsoft partnered with BeeKeeperAI to allow AI developers to access it through the Azure confidential computing environment.

“The opportunity for AI to enable the delivery of better healthcare outcomes continues to expand exponentially, but developers are limited by access to critical datasets to train and to deploy their algorithms,” said John Doyle, global chief technology officer at Microsoft, in a press release from BeeKeeperAI. “We are pleased to partner with BeeKeeperAI to help the healthcare industry develop the understanding and expertise it needs to leverage confidential computing within healthcare innovation.”

4. Secure contact tracing

Contact tracing has become a household phrase after COVID-19. Intel notes that confidential computing — based on the blockchain, in this case — is the backbone of MicrobeTraceNext, an AI project made in collaboration with Intel and Leidos.

Two blockchain keys and role-based security control protect PII. Intel Xeon Scalable processor platforms enable the ledger-based encryption, which makes all data access and data movements fully auditable and traceable and all transactions unchangeable. Confidential computing enhances secure contact tracing at the regional or state level.

5. Secure medical imaging

Intel also noted that medical imaging can benefit from confidential computing. They contributed Intel Xeon Scalable processors and AI acceleration to Federated Learning, a privacy project that allowed three hospitals to share a common AI model without sharing PII. Each hospital trained its AI model locally, then aggregated that data at a central server in the cloud. The aggregation made sure that the model could improve based on all three hospitals.

No patient information nor the AI model IP itself was shared. This distinction was enabled by Intel’s confidential computing. The AI model, which was trained to diagnose medical images, was learning from all three hospitals while secured against outside eyes.

Further reading

Explore more on automation in healthcare, gaming and the metaverse for patients, and how to keep AI from reflecting implicit human bias.



Source link

Related articles

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
Tags: computingconfidentialhealthcareTop
Share76Tweet47

Related Posts

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
0

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in...

New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
0

Several days after news of exploit attempts against a zero day vulnerability in the GoAnywhere MFT secure file transfer tool...

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

February 8, 2023
0

World’s fastest real-time quantum random number generator with a photonic integrated chip. Credit: Bing Bai and Yao ZhengThe world of...

Sentra Raises $30 Million for DSPM Technology

Germany Appoints Central Bank IT Chief to Head Cybersecurity

February 8, 2023
0

The German government announced the appointment Tuesday of the European Central Bank’s head of IT systems to lead the national...

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

February 8, 2023
0

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
“Fintech Right Now is a Boys Club” – How to Close the Gender Gap in Fintech with Stax

Spotlight: How the Isle of Man Became an Insurtech Hub

February 8, 2023

Recent Posts

Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved