Confidential computing: What does this have to do with the Sealed Cloud?
Confidential computing describes the approach of not only encrypting data during storage and transmission, but also during processing. To this end, several major providers—including Google, IBM, Intel, Microsoft and Alibaba—have founded the Confidential Computing Consortium under the umbrella of the Linux Foundation. The consortium aims to develop tools and strategies to accelerate the adoption of Confidential Computing.
An alternative name for the same concept is “zero-knowledge computing.”
How does confidential computing work?
Confidential computing involves processing data only within a secure enclave, or trusted execution environment (TEE). These areas are shielded from each other and from the rest of the system, in which only signed code has access to the data. Access to processed data is therefore impossible, even with admin permissions.
And what does this have to do with uniscon?
uniscon follows the same approach with its Sealed Cloud, but solves it differently: to protect data from third parties during processing, it is processed in tamper-proof capsules—the so-called “Data Clean-up Areas” (DCUAs)—which use purely technical measures to prevent any access. The technology behind this is known as “Sealed Cloud Technology”. Currently, more than 1,200 companies from all industries are already using unicon’s sealed cloud solutions.
In a nutshell:
Learn more about the Sealed Cloud Technology and uniscon’s sealed platform: