Mingshen Sun

Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies

How can you verifiably prove your microservices are protecting sensitive data, even from privileged administrators?

Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
#1about 1 minute

The challenge of data security in microservice architectures

Microservice architectures offer scalability but create data protection challenges as sensitive data flows freely between many services.

#2about 5 minutes

Understanding confidential computing and trusted execution environments

Confidential computing uses hardware-based trusted execution environments (TEEs) to isolate data and code during processing, providing verifiable proof through remote attestation.

#3about 4 minutes

Key challenges of applying PETs at scale

Implementing privacy-enhancing technologies at scale is difficult due to microservice flexibility, the need for fine-grained purpose limitation, and providing verifiable transparency.

#4about 5 minutes

A solution combining serverless and confidential computing

A proposed architecture uses serverless computing to isolate sensitive data logic within a trusted execution environment, combined with pseudonymization for end-to-end protection.

#5about 4 minutes

Enabling third-party verification with remote attestation

Remote attestation allows third parties to verify workloads, enabling trusted management of key services like KMS and attestation services for hardware-backed access control.

#6about 2 minutes

Summary of the data protection architecture

The solution combines serverless computing, end-to-end data protection, and third-party verification to secure sensitive data in microservices while preserving flexibility.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
DC
Daniel Cranney
The Overflow: Security and Privacy
Every week we dig through hundreds of links from all over the web, and it’s often hard for developers keep up. So, we thought we’d put together some links we couldn’t fit in the Dev Digest in what we call The Overflow. This week, we’re looking at wha...
The Overflow: Security and Privacy
DC
Daniel Cranney
Dev Digest 211: Securing Agents, Top AI Apps and Lost Readers…
Inside last week’s Dev Digest 211 . 🏗️ Can the infrastructure keep up with AI growth? 📱 Top 100 GenAI consumer apps 🪱 Wikipedia hit by worm and AI slop 🔍 The results of Codex Security scanning 1.2M commits 🧹 Bye bye innerHTML, welcome setHTML() 🔄 Cl...
Dev Digest 211: Securing Agents, Top AI Apps and Lost Readers…
CH
Chris Heilmann
Dev Digest 134 - Where pixels sing?
News and ArticlesWeAreDevelopers LIVE Data and Security Day is on Wednesday, 25/09/2024. Learn about OPC UA Updates, Best Practices for Using GitHub Secrets, Passwordless Web 1.5, Emerging AI Security Risks, Data Privacy in LLMs and get a chance to t...
Dev Digest 134 - Where pixels sing?

From learning to earning

Jobs that call for the skills explored in this talk.