Intel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

We Keep you Connected

Intel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services

Intel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services
Your email has been sent
The attestation service is designed to allow data in confidential computing environments to interact with AI safely, as well as provide policy enforcements and audits.
The second day of announcements at Intel’s Innovation event in San Jose, California focused on privacy and security, including confidential AI. Major announcements included an attestation service for Intel Trust Authority and a software toolkit for fully homomorphic encryption.
Intel positioned its company strategy as supporting developers who need high-performance AI hardware and software for sensitive business data.
“The developer community is the catalyst helping industries leverage AI to meet their diverse needs – both today and into the future,” Intel CTO Greg Lavender said. “AI can and should be accessible to everyone to deploy responsibly.”
In addition, the company announced Intel-optimized distributions of enterprise software releases from Red Hat, Canonical and SUSE.
Jump to:
An attestation service will join the Intel Trust Authority, a security assessment platform released in 2022. The attestation service can verify the trustworthiness of a confidential computing environment, regardless of who is operating the data center. Users can set their own policies about what is required of their environment.
The beta release of attestation for Intel Trust Authority will go live later this year in Intel Developer Cloud.
Trust Authority integrates with the technical requirements for confidential AI environments in which intellectual property and sensitive or proprietary data may be processed in secured machine learning applications.
“Zero Trust gives organizations the ability to operate more securely in IT environments where they can’t verify directly that users, devices or network infrastructure are secure and who/what they claim they are. Intel Trust Authority takes that security one step further and verifies the computation path from apps to silicon can be trusted,” said Ken Urquhart, global vice president of 5G strategy at Zscaler, in a case study (PDF) by Intel and Zscaler.
Intel plans to develop an application-specific integrated circuit (ASIC) accelerator for fully homomorphic encryption. It fills a need for very high performance overhead in a software-only FHE approach, Intel said.
FHE is important to AI models because it allows calculations to take place directly on encrypted data, protecting AI models and data from tampering and outside manipulation.
Auto Pilot for Kubernetes pod resource rightsizing is coming to Intel Granulate, a workload performance optimization solution. Pod resource rightsizing monitors memory capacity and automatically gives capacity management recommendations when needed. Ideally, Auto Pilot for Kubernetes pod resource rightsizing will lower the investment threshold for cost-performance metrics for containerized environments. It can result in lowered Kubernetes costs, Lavender said.
Intel plans to launch a beta later this year of an encrypted computing software toolkit in Intel Developer Cloud. The encrypted computing software toolkit will let researchers, developers and other users try out FHE coding. The toolkit will include interfaces to develop FHE software, translation tools and a hardware accelerator simulator. Intel expects to release version 1.0 in December.
Intel has joined The Linux Foundation’s Unified Acceleration consortium, which will build upon Intel’s oneAPI specification to provide standards for cross-platform development across multiple architectures. Intel will contribute the oneAPI specification, which can be used to work on cross-platform development across multiple architectures.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Intel Innovation 2023: Attestation and Fully Homomorphic Encryption Coming to Intel Cloud Services
Your email has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
Microsoft is also running a grant competition for ideas on using AI training in community building.
Generative AI will be a game changer in cloud security, especially in common pain points like preventing threats, reducing toil from repetitive tasks, and bridging the cybersecurity talent gap.
Does your business need a payroll provider that offers international payroll services? Use our buyer’s guide to review the best solutions, from ADP to Oyster.
Get up and running with ChatGPT with this comprehensive cheat sheet. Learn everything from how to sign up for free to enterprise use cases, and start using ChatGPT quickly and effectively.
Looking for an alternative to monday.com? Our comprehensive list covers the best monday alternatives, their key features, pricing, pros, cons and more.
Strengthen your organization’s IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices.
Keeping all the various moving parts of a business running smoothly and on time requires a well-organized individual who can see the final goal of a project, develop a path to reach that goal and communicate the path that must be followed to all the individuals and teams working to bring that final goal to …
SSL certificates are essential for encrypting traffic between systems such as clients, which access servers via web browsers or applications that communicate with remote systems. Certificates protect client and server data, commonly involving confidential information such as credit card details or social security numbers. The purpose of this SSL Certificate Best Practices Policy from TechRepublic …
Mobile devices are a way of life in both the consumer and business realms — and business interests must be protected where the two converge. This policy from TechRepublic Premium provides guidelines for the safe and productive use of mobile devices (laptop computers, tablets, smartphones, etc.) by employees. It includes stipulations for company and employee-owned …
The ability to measure the financial success or failure of an enterprise is driven by the double-entry bookkeeping system, a financial accounting system that dates to the 13th century and an Italian mathematician named Luca Pacioli. This list of accounting terms from TechRepublic Premium will help you grasp the vocabulary and the concepts underlying this …

source

GET THE LATEST UPDATES, OFFERS, INFORMATION & MORE