Mingshen Sun
Safeguarding Sensitive Data Access At Scale with Privacy-Enhancing Technologies
#1about 1 minute
The challenge of data security in microservice architectures
Microservice architectures offer scalability but create data protection challenges as sensitive data flows freely between many services.
#2about 5 minutes
Understanding confidential computing and trusted execution environments
Confidential computing uses hardware-based trusted execution environments (TEEs) to isolate data and code during processing, providing verifiable proof through remote attestation.
#3about 4 minutes
Key challenges of applying PETs at scale
Implementing privacy-enhancing technologies at scale is difficult due to microservice flexibility, the need for fine-grained purpose limitation, and providing verifiable transparency.
#4about 5 minutes
A solution combining serverless and confidential computing
A proposed architecture uses serverless computing to isolate sensitive data logic within a trusted execution environment, combined with pseudonymization for end-to-end protection.
#5about 4 minutes
Enabling third-party verification with remote attestation
Remote attestation allows third parties to verify workloads, enabling trusted management of key services like KMS and attestation services for hardware-backed access control.
#6about 2 minutes
Summary of the data protection architecture
The solution combines serverless computing, end-to-end data protection, and third-party verification to secure sensitive data in microservices while preserving flexibility.
Related jobs
Jobs that call for the skills explored in this talk.
Sunhat
Köln, Germany
Remote
€85-115K
Senior
Team Leadership
Software Architecture
+1
Matching moments
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
05:55 MIN
The security risks of AI-generated code and slopsquatting
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
04:57 MIN
Increasing the value of talk recordings post-event
Cat Herding with Lions and Tigers - Christian Heilmann
02:39 MIN
Establishing a single source of truth for all data
Cat Herding with Lions and Tigers - Christian Heilmann
03:39 MIN
Breaking down silos between HR, tech, and business
What 2025 Taught Us: A Year-End Special with Hung Lee
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
04:27 MIN
Moving beyond headcount to solve business problems
What 2025 Taught Us: A Year-End Special with Hung Lee
03:14 MIN
Proactively managing the risks of employee personal branding
Leveraging Leaders’ Voices: The Business Power of Personal Branding
Featured Partners
Related Videos
TikTok's Privacy Innovation
Mingshen Sun
This Machine Ends Data Breaches
Liz Moy
Beyond the Hype: Building Trustworthy and Reliable LLM Applications with Guardrails
Alex Soto
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
GenAI Security: Navigating the Unseen Iceberg
Maish Saidel-Keesing
You can’t hack what you can’t see
Reto Kaeser
Unlocking Value from Data: The Key to Smarter Business Decisions-
Taqi Jaffri, Kapil Gupta & Farooq Sheikh and Tomislav Tipurić
Prompt Injection, Poisoning & More: The Dark Side of LLMs
Keno Dreßel
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.




Power Solution
Intermediate
Microsoft Access
Scripting (Bash/Python/Go/Ruby)

Scope AT
Senior
Azure
Amazon Web Services (AWS)



