Unlocking secure, private AI with confidential computing (2024)

All of a sudden, it seems that AI is everywhere, from executive assistant chatbots to AI code assistants.

But despite the proliferation of AI in the zeitgeist, many organizations are proceeding with caution. This is due to the perception of the security quagmires AI presents. For the emerging technology to reach its full potential, data must be secured through every stage of the AI lifecycle including model training, fine-tuning, and inferencing.

This is where confidential computing comes into play. Vikas Bhatia, head of product for Azure Confidential Computing at Microsoft, explains the significance of this architectural innovation: “AI is being used to provide solutions for a lot of highly sensitive data, whether that’s personal data, company data, or multiparty data,” he says. “Confidential computing is an emerging technology that protects that data when it is in memory and in use. We see a future where model creators who need to protect their IP will leverage confidential computing to safeguard their models and to protect their customer data.”

Understanding confidential computing

“The tech industry has done a great job in ensuring that data stays protected at rest and in transit using encryption,” Bhatia says. “Bad actors can steal a laptop and remove its hard drive but won’t be able to get anything out of it if the data is encrypted by security features like BitLocker. Similarly, nobody can run away with data in the cloud. And data in transit is secure thanks to HTTPS and TLS, which have long been industry standards.”

But data in use, when data is in memory and being operated upon, has typically been harder to secure. Confidential computing addresses this critical gap—what Bhatia calls the “missing third leg of the three-legged data protection stool”—via a hardware-based root of trust.

Essentially, confidential computing ensures the only thing customers need to trust is the data running inside of a trusted execution environment (TEE) and the underlying hardware. “The concept of a TEE is basically an enclave, or I like to use the word ‘box.’ Everything inside that box is trusted, anything outside it is not,” explains Bhatia.

Until recently, confidential computing only worked on central processing units (CPUs). However, NVIDIA has recently brought confidential computing capabilities to the H100 Tensor Core GPU and Microsoft has made this technology available in Azure. This has the potential to protect the entire confidential AI lifecycle—including model weights, training data, and inference workloads.

“Historically, devices such as GPUs were controlled by the host operating system, which, in turn, was controlled by the cloud service provider," notes Krishnaprasad Hande, Technical Program Manager at Microsoft. "So, in order to meet confidential computing requirements, we needed technological improvements to reduce trust in the host operating system, i.e., its ability to observe or tamper with application workloads when the GPU is assigned to a confidential virtual machine, while retaining sufficient control to monitor and manage the device. NVIDIA and Microsoft have worked together to achieve this."

Attestation mechanisms are another key component of confidential computing. Attestation allows users to verify the integrity and authenticity of the TEE, and the user code within it, ensuring the environment hasn’t been tampered with. “Customers can validate that trust by running an attestation report themselves against the CPU and the GPU to validate the state of their environment,” says Bhatia.

Additionally, secure key management systems play a critical role in confidential computing ecosystems. “We’ve extended our Azure Key Vault with Managed HSM service which runs inside a TEE,” says Bhatia. “The keys get securely released inside that TEE such that the data can be decrypted.”

Confidential computing use cases and benefits

GPU-accelerated confidential computing has far-reaching implications for AI in enterprise contexts. It also addresses privacy issues that apply to any analysis of sensitive data in the public cloud. This is of particular concern to organizations trying to gain insights from multiparty data while maintaining utmost privacy.

Another of the key advantages of Microsoft’s confidential computing offering is that it requires no code changes on the part of the customer, facilitating seamless adoption. “The confidential computing environment we’re building does not require customers to change a single line of code,” notes Bhatia. “They can redeploy from a non-confidential environment to a confidential environment. It’s as simple as choosing a particular VM size that supports confidential computing capabilities.”

Some industries and use cases that stand to benefit from confidential computing advancements include:

  • Governments and sovereign entities dealing with sensitive data and intellectual property.
  • Healthcare organizations using AI for drug discovery and doctor-patient confidentiality.
  • Banks and financial firms using AI to detect fraud and money laundering through shared analysis without revealing sensitive customer information.
  • Manufacturers optimizing supply chains by securely sharing data with partners.

Further, Bhatia says confidential computing helps facilitate data “clean rooms” for secure analysis in contexts like advertising. “We see a lot of sensitivity around use cases such as advertising and the way customers’ data is being handled and shared with third parties,” he says. “So, in these multiparty computation scenarios, or ‘data clean rooms,’ multiple parties can merge in their data sets, and no single party gets access to the combined data set. Only the code that is authorized will get access.”

Unlocking secure, private AI with confidential computing (1)

The current state—and expected future—of confidential computing

Although large language models (LLMs) have captured attention in recent months, enterprises have found early success with a more scaled-down approach: small language models (SLMs), which are more efficient and less resource-intensive for many use cases. “We can see some targeted SLM models that can run in early confidential GPUs,” notes Bhatia.

This is just the start. Microsoft envisions a future that will support larger models and expanded AI scenarios—a progression that could see AI in the enterprise become less of a boardroom buzzword and more of an everyday reality driving business outcomes. “We’re starting with SLMs and adding in capabilities that allow larger models to run using multiple GPUs and multi-node communication. Over time, [the goal is eventually] for the largest models that the world might come up with could run in a confidential environment,” says Bhatia.

Bringing this to fruition will be a collaborative effort. Partnerships among major players like Microsoft and NVIDIA have already propelled significant advancements, and more are on the horizon. Organizations like the Confidential Computing Consortium will also be instrumental in advancing the underpinning technologies needed to make widespread and secure use of enterprise AI a reality.

“We’re seeing a lot of the critical pieces fall into place right now,” says Bhatia. “We don’t question today why something is HTTPS. That’s the world we’re moving toward [with confidential computing], but it’s not going to happen overnight. It’s certainly a journey, and one that NVIDIA and Microsoft are committed to.”

Microsoft Azure customers can start on this journey today with Azure confidential VMs with NVIDIA H100 GPUs. Learn more here.

This content was produced by Insights, the custom content arm of MIT Technology Review. It was not written by MIT Technology Review’s editorial staff.

Unlocking secure, private AI with confidential computing (2024)

FAQs

Unlocking secure, private AI with confidential computing? ›

Innovative architecture is making multiparty data insights safe for AI at rest, in transit, and in use in memory in the cloud. All of a sudden, it seems that AI is everywhere, from executive assistant chatbots to AI code assistants.

What is confidential AI? ›

Fortanix Confidential AI is a new platform for data teams to work with their sensitive data sets and run AI models in confidential compute.

How does AI breach privacy? ›

Unauthorized access to personal data: AI systems often require access to personal data in order to function. If this data is not properly secured, it can be accessed by unauthorized individuals or organizations, leading to privacy violations including identity theft.

How does confidential computing work? ›

Confidential computing is a cloud computing technology that protects data during processing. Exclusive control of encryption keys delivers stronger end-to-end data security in the cloud. Confidential computing technology isolates sensitive data in a protected CPU enclave during processing.

What is private AI? ›

Private AI allows businesses to use data while retaining control. Leanne Starace, SVP Global Solutions Architecture & Engineering, Equinix. Private AI must be operational in non-public environments, allowing businesses to use their proprietary data while retaining full control.

Is using AI considered cheating? ›

AI cheating is simply when students use advanced computer programs, also known as artificial intelligence, to dishonestly complete their schoolwork or exams while pretending that the work is their own.

What do you mean by AI privacy? ›

AI privacy involves ensuring that individuals have control over their personal data and that it is used in a responsible and ethical manner. The importance of AI privacy cannot be overstated.

Is AI content detector real? ›

As artificial intelligence writing tools evolve, so do the methods for detecting AI-generated content. But how accurate is an AI detector in distinguishing AI from human-generated content? AI detectors are not foolproof, but they are relatively accurate.

What is a confidential virtual machine? ›

Confidential VM instances are a type of Compute Engine virtual machine. They use hardware-based memory encryption to help ensure your data and applications can't be read or modified while in use.

Top Articles
Psychology, Bachelor of Arts | Benedictine | Chicago
Religion review Notes | Knowt
Tales From The Crib Keeper 14
What Time Subway Open
Craigslist Richmond Ba
Duralast Battery H6-Dl Group Size 48 680 Cca
Ohio Lottery Full Site
6Th Gen Camaro Forums
Busted Newspaper Williams County
8 Casablanca Restaurants You’ll Want to Fly For | Will Fly for Food
Sophia Turner Derek Deso Instagram
ONE PAN BROCCOLI CASHEW CHICKEN
Ironman Kona Tracker
Weldmotor Vehicle.com
8042872020
Banned in NYC: Airbnb One Year Later
Icdrama Hong Kong Drama
Koal Bargain Bin
Papa's Games Unblocked Games
Caldwell Idaho Craigslist
Hendricks County Mugshots Busted Newspaper
Top Songs On Octane 2022
Stellaris Resolutions
Hinzufügen Ihrer Konten zu Microsoft Authenticator
Kidcheck Login
Orileys Auto Near Me
Po Box 182223 Chattanooga Tn 37422 7223
Ottumwa Evening Post Obits
About Us - Carrols Corporation
Fedex Passport Locations Near Me
Hewn New Bedford
Marissa.munoz17
Lily Spa Roanoke Rapids Reviews
Theater X Orange Heights Florida
How Much Is 10000 Nickels
Best Boxing Gyms Near Me
Www Muslima Com
Things To Do in Sanford, Florida - Historic Downtown Sanford
FedEx in meiner Nähe - Wien
Uc Davis Tech Management Minor
Naviance Hpisd
Grayson County Craigslist
Documentaries About FLDS: Insightful Looks into the Fundamentalist Church
Legend Of Krystal Forums
2024 USAF & USSF Almanac: DAF Personnel | Air & Space Forces Magazine
Wyoming Roads Cameras
The Hollis Co Layoffs
Craigslist Farm And Garden Atlanta Georgia
When His Eyes Opened Chapter 191
Stihl Bg55 Parts Diagram
Bòlèt New York Soir
Latest Posts
Article information

Author: Catherine Tremblay

Last Updated:

Views: 6158

Rating: 4.7 / 5 (67 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Catherine Tremblay

Birthday: 1999-09-23

Address: Suite 461 73643 Sherril Loaf, Dickinsonland, AZ 47941-2379

Phone: +2678139151039

Job: International Administration Supervisor

Hobby: Dowsing, Snowboarding, Rowing, Beekeeping, Calligraphy, Shooting, Air sports

Introduction: My name is Catherine Tremblay, I am a precious, perfect, tasty, enthusiastic, inexpensive, vast, kind person who loves writing and wants to share my knowledge and understanding with you.