Skip to content

Commit 038a1f3

Browse files
authored
#sign-off
1 parent 354a67e commit 038a1f3

File tree

1 file changed

+5
-5
lines changed

1 file changed

+5
-5
lines changed

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -50,19 +50,19 @@ Partnered health facilities contribute private health data sets to train an ML m
5050

5151
### Protecting privacy with IoT and smart-building solutions
5252

53-
Many countries have strict privacy laws about gathering and using data on people’s presence and movements inside buildings, this may include personally identifiable data like CCTV or badge-swipes or sets of data which could be considered personally identifiable when grouped together.
53+
Many countries have strict privacy laws about gathering and using data on people’s presence and movements inside buildings.This may include data that is directly personally identifiable data from CCTV or security badge swipes. Or, indirectly identifiable where different sets of sensor data could be considered personally identifiable when grouped together.
5454

5555
Privacy needs to be balanced with cost & environmental needs where organizations are keen to understand occupancy/movement in-order to provide the most efficient use of energy to heat and light a building.
5656

5757
Determining which areas of corporate real-estate are under or over-occupied by staff from individual departments typically requires processing some personally identifiable data alongside less individual data like temperature and light sensors.
5858

59-
In this use-case the primary goal is allowing analysis of occupancy data as well as temperature sensors to be processed alongside CCTV motion tracing sensors and badge-swipe data to understand usage without exposing the raw aggregate data to anyone.
59+
In this use-case the primary goal is allowing analysis of occupancy data and temperature sensors to be processed alongside CCTV motion tracing sensors and badge-swipe data to understand usage without exposing the raw aggregate data to anyone.
6060

61-
Confidential compute is leveraged here by placing the analysis application (in this example running on Confidential Container Instances) inside a trusted execution environment where the in-use data is protected by encryption.
61+
Confidential compute is used here by placing the analysis application (in this example running on Confidential Container Instances) inside a trusted execution environment where the in-use data is protected by encryption.
6262

63-
Additionally, the aggregate data-sets from many types of sensor and data feed are managed in an Azure SQL Always Encrypted with Enclaves database, this protects in-use queries by encrypting them in-memory and preventing a server administrator from being able to access the aggregate data set whilst it is being queried and analysed.
63+
The aggregate data-sets from many types of sensor and data feed are managed in an Azure SQL Always Encrypted with Enclaves database, this protects in-use queries by encrypting them in-memory. This prevents a server administrator from being able to access the aggregate data set while it is being queried and analysed.
6464

65-
:::image type="content" source="media/use-cases-scenarios/iot-sensors.jpg" alt-text="Graphic showing different smart building sensors being fed into an analysis solution hosted inside a trusted execution environment (TEE). The solution outputs a dashboard for operators to analyse de-personalised building information whilst the operator has no access to the analysis happening inside the TEE that protects large groups of potentially personally identifiable data.":::
65+
:::image type="content" source="media/use-cases-scenarios/iot-sensors.jpg" alt-text="Diverse sensors feeding an analysis solution inside a trusted execution environment. Operators have no access to in-use data inside the TEE":::
6666

6767
## Enhanced customer data privacy
6868

0 commit comments

Comments
 (0)