A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://www.techtarget.com/searchcloudcomputing/definition/confidential-computing below:

What is Confidential Computing? | Definition from TechTarget

By

Published: Jun 17, 2025

Confidential computing is a concept in which encrypted data can be processed in memory to limit access to protect data in use. It is especially suitable for public clouds.

Confidential computing also focuses on software and hardware-based security. It ensures data is secured and encrypted against risks such as malicious insiders, network vulnerabilities or any threat to hardware- or software-based technology that could be compromised.

The idea of confidential computing has gained importance as public cloud services become more widely used. Organizations that use cloud computing environments benefit from the increased sense of security that confidential computing offers.

How confidential computing works

Normally, service providers encrypt data when it's stored or transferred, but that data is no longer encrypted when in use. The goal is to process data in memory while that data is still encrypted, which reduces the exposure of any sensitive data. The only time data is unencrypted is when a system's code allows a user to access it. This also means that the data is hidden from the cloud provider. A major component of this functionality is a hardware-based trusted execution environment (TEE), which isolates data and the computation performed on it from the rest of the hosting system.

Data security in a TEE scenario is different from traditional data encryption methods. The latter is about protecting data both in motion and in storage, while TEEs are about protecting data while it's being processed. Put another way, end-to-end data security -- before, during and after application execution -- requires both.

Benefits of confidential computing

Confidential computing offers users and providers the following benefits:

Organizations that use cloud computing environments benefit from the increased sense of security that confidential computing offers. Challenges of confidential computing

Although confidential computing has many benefits, it also has the following challenges:

Confidential computing use cases

Confidential computing has many uses pertaining to protecting data in trusted environments. For example, it can be used to do the following:

Confidential computing is being used in healthcare to perform data analytics on large data sets where privacy is critical. It is also used to handle patient healthcare information and process electronic health records.

In the financial industry, confidential computing is being used to process bank transactions, credit histories and other private data, as well as to run risk analysis and fraud detection models based on real-world data.

The Confidential Computing Consortium

The Confidential Computing Consortium (CCC), a group of organizations whose goal is to build cross-platform tools for confidential computing, has largely supported and defined confidential computing. Created in 2019 under the Linux Foundation, the consortium wants to make it easier to run computations in what's known as enclaves -- a TEE that is protected from hardware, OSes and other applications.

The consortium is made up of hardware vendors, cloud providers and developers. Its function is to do the following:

It also aims to support community-based projects that can protect applications, programs and virtual machines (VMs)and to aid other organizations in applying confidential security changes. In addition, the CCC developed the Confidential Consortium Framework, an open source framework for building secure and highly available applications.

Accenture, Alibaba, Arm, Google, Huawei, IBM, Intel, Meta, Microsoft and Red Hat are examples of vendors that participate in the CCC.

Confidential computing tools and providers

Confidential computing can include many different tools and services. The organizations in the CCC have already developed many tools that support trusted execution environments and confidential computing. The following is a sampling of these open source tools:

The future of confidential computing

Despite its many challenges, confidential computing is expected to expand beyond its already considerable presence and provide opportunities for unification into a more cohesive industry mainstay.

The following are some potential developments:

Moving workloads and applications to the cloud can be daunting. Learn what migration security challenges exist and what best practices organizations can use to mitigate these risks.

Continue Reading About What is confidential computing? Dig Deeper on Cloud infrastructure design and management

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4