Mingshen Sun
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
#1about 1 minute
The challenge of data security in microservice architectures
Microservice architectures offer scalability but create data protection challenges as sensitive data flows freely between many services.
#2about 5 minutes
Understanding confidential computing and trusted execution environments
Confidential computing uses hardware-based trusted execution environments (TEEs) to isolate data and code during processing, providing verifiable proof through remote attestation.
#3about 4 minutes
Key challenges of applying PETs at scale
Implementing privacy-enhancing technologies at scale is difficult due to microservice flexibility, the need for fine-grained purpose limitation, and providing verifiable transparency.
#4about 5 minutes
A solution combining serverless and confidential computing
A proposed architecture uses serverless computing to isolate sensitive data logic within a trusted execution environment, combined with pseudonymization for end-to-end protection.
#5about 4 minutes
Enabling third-party verification with remote attestation
Remote attestation allows third parties to verify workloads, enabling trusted management of key services like KMS and attestation services for hardware-backed access control.
#6about 2 minutes
Summary of the data protection architecture
The solution combines serverless computing, end-to-end data protection, and third-party verification to secure sensitive data in microservices while preserving flexibility.
Related jobs
Jobs that call for the skills explored in this talk.
Featured Partners
Related Videos
TikTok's Privacy Innovation
Mingshen Sun
This Machine Ends Data Breaches
Liz Moy
Beyond the Hype: Building Trustworthy and Reliable LLM Applications with Guardrails
Alex Soto
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
GenAI Security: Navigating the Unseen Iceberg
Maish Saidel-Keesing
You can’t hack what you can’t see
Reto Kaeser
Unlocking Value from Data: The Key to Smarter Business Decisions-
Taqi Jaffri, Kapil Gupta & Farooq Sheikh and Tomislav Tipurić
Secure and Private AI - DeepMask
Hissan Usmani
From learning to earning
Jobs that call for the skills explored in this talk.
Security-by-Design for Trustworthy Machine Learning Pipelines
Association Bernard Gregory
Machine Learning
Continuous Delivery
Security Architect
Planet Payment
Municipality of Madrid, Spain
Partner Solution Architect - Security
Microsoft
Charing Cross, United Kingdom
€78K
Azure
Microsoft Dynamics
Cloud Security Engineer
Policy Expert
Charing Cross, United Kingdom
Google Cloud Platform
Continuous Integration
Amazon Web Services (AWS)


