xxx
Description
PEC comprises three types of technologies that protect data while it’s being used to enable secure data processing and data analytics:
The first provides a trusted environment in which sensitive data can be processed or analyzed. It includes trusted third parties and hardware-trusted execution environments (also called confidential computing).
The second performs processing and analytics in a decentralized manner. It includes federated machine learning and privacy-aware machine learning.
The third transforms data and algorithms before processing or analytics. It includes differential privacy, homomorphic encryption, secure multiparty computation, zero-knowledge proofs, private set intersection and private information retrieval.
Each technology provides specific secrecy and privacy guarantees, and some can be combined for greater efficacy.From Gartner Reprint:
xxx