Bhalla, Janak Bharat (2025) Safeguarding sensitive data with confidential computing. World Journal of Advanced Engineering Technology and Sciences, 15 (2). pp. 421-427. ISSN 2582-8266
![WJAETS-2025-0505.pdf [thumbnail of WJAETS-2025-0505.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJAETS-2025-0505.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Confidential computing emerges as a transformative solution in modern data protection, addressing critical vulnerabilities in cloud environments and digital infrastructure. By implementing hardware-based security mechanisms through Trusted Execution Environments (TEEs), organizations can now protect sensitive information throughout their entire computational lifecycle. The technology revolutionizes secure data processing across healthcare, financial services, government, and IoT sectors, enabling unprecedented levels of privacy and security. With innovations in homomorphic encryption, confidential virtual machines, and secure AI processing, organizations can harness the power of cloud computing while maintaining stringent data protection standards. The integration of these advanced security measures creates new possibilities for secure collaboration, data sharing, and privacy-preserving computation in an increasingly interconnected digital landscape.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjaets.2025.15.2.0505 |
Uncontrolled Keywords: | Confidential Computing; Hardware Security; Privacy Protection; Secure Enclaves; Data Encryption |
Depositing User: | Editor Engineering Section |
Date Deposited: | 04 Aug 2025 16:26 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/3459 |