Mingshen Sun
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
#1about 1 minute
The challenge of data security in microservice architectures
Microservice architectures offer scalability but create data protection challenges as sensitive data flows freely between many services.
#2about 5 minutes
Understanding confidential computing and trusted execution environments
Confidential computing uses hardware-based trusted execution environments (TEEs) to isolate data and code during processing, providing verifiable proof through remote attestation.
#3about 4 minutes
Key challenges of applying PETs at scale
Implementing privacy-enhancing technologies at scale is difficult due to microservice flexibility, the need for fine-grained purpose limitation, and providing verifiable transparency.
#4about 5 minutes
A solution combining serverless and confidential computing
A proposed architecture uses serverless computing to isolate sensitive data logic within a trusted execution environment, combined with pseudonymization for end-to-end protection.
#5about 4 minutes
Enabling third-party verification with remote attestation
Remote attestation allows third parties to verify workloads, enabling trusted management of key services like KMS and attestation services for hardware-backed access control.
#6about 2 minutes
Summary of the data protection architecture
The solution combines serverless computing, end-to-end data protection, and third-party verification to secure sensitive data in microservices while preserving flexibility.
Related jobs
Jobs that call for the skills explored in this talk.
SENIOR AI SOLUTIONS ENGINEER (M/W/D) Based in Germany
Wilken GmbH
Ulm, Germany
Senior
Kubernetes
AI Frameworks
+3
Matching moments
07:07 MIN
Introducing a two-stage data clean room solution
TikTok's Privacy Innovation
28:49 MIN
Practical applications and use cases for TEEs
This Machine Ends Data Breaches
04:26 MIN
Limitations of existing data privacy solutions
TikTok's Privacy Innovation
00:03 MIN
Data breaches are a persistent threat for all companies
This Machine Ends Data Breaches
24:38 MIN
Building trusted environments for responsible AI
Bringing AI Everywhere
22:34 MIN
Exploring the confidential computing ecosystem
This Machine Ends Data Breaches
14:41 MIN
Protecting sensitive data with privacy guardrails
Beyond the Hype: Building Trustworthy and Reliable LLM Applications with Guardrails
33:54 MIN
Q&A on microservice architecture and security
Security Challenges of Breaking A Monolith
Featured Partners
Related Videos
TikTok's Privacy Innovation
Mingshen Sun
This Machine Ends Data Breaches
Liz Moy
Beyond the Hype: Building Trustworthy and Reliable LLM Applications with Guardrails
Alex Soto
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
GenAI Security: Navigating the Unseen Iceberg
Maish Saidel-Keesing
You can’t hack what you can’t see
Reto Kaeser
Unlocking Value from Data: The Key to Smarter Business Decisions-
Taqi Jaffri, Kapil Gupta & Farooq Sheikh and Tomislav Tipurić
Prompt Injection, Poisoning & More: The Dark Side of LLMs
Keno Dreßel
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.


Security Architect - Privileged Access Management
Devoteam
IIS
Linux
Google Cloud Platform
Amazon Web Services (AWS)
Microsoft Active Directory

Security Solutions Architect - SC Cleared - Data Centric Security
Coltech Global
Corsham, United Kingdom
Remote






Software Engineer - SDLC Security - Public Artifacts
Datadog
Paris, France
DevOps
Python
Kubernetes
Configuration Management