You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/confidential-computing/use-cases-scenarios.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ Partnered health facilities contribute private health data sets to train an ML m
50
50
51
51
### Protecting privacy with IoT and smart-building solutions
52
52
53
-
Many countries have strict privacy laws about gathering and using data on people’s presence and movements inside buildings.This may include data that is directly personally identifiable data from CCTV or security badge swipes. Or, indirectly identifiable where different sets of sensor data could be considered personally identifiable when grouped together.
53
+
Many countries have strict privacy laws about gathering and using data on people’s presence and movements inside buildings.This may include data that is directly personally identifiable data from CCTV or security badge swipes. Or, indirectly identifiable where different sets of sensor data could be considered personally identifiable when grouped together.
54
54
55
55
Privacy needs to be balanced with cost & environmental needs where organizations are keen to understand occupancy/movement in-order to provide the most efficient use of energy to heat and light a building.
56
56
@@ -60,9 +60,9 @@ In this use-case the primary goal is allowing analysis of occupancy data and tem
60
60
61
61
Confidential compute is used here by placing the analysis application (in this example running on Confidential Container Instances) inside a trusted execution environment where the in-use data is protected by encryption.
62
62
63
-
The aggregate data-sets from many types of sensor and data feed are managed in an Azure SQL Always Encrypted with Enclaves database, this protects in-use queries by encrypting them in-memory. This prevents a server administrator from being able to access the aggregate data set while it is being queried and analysed.
63
+
The aggregate data-sets from many types of sensor and data feed are managed in an Azure SQL Always Encrypted with Enclaves database, this protects in-use queries by encrypting them in-memory. This prevents a server administrator from being able to access the aggregate data set while it is being queried and analyzed.
64
64
65
-
:::image type="content" source="media/use-cases-scenarios/iot-sensors.jpg" alt-text="Diverse sensors feeding an analysis solution inside a trusted execution environment. Operators have no access to in-use data inside the TEE":::
65
+
:::image type="content" source="media/use-cases-scenarios/iot-sensors.jpg" alt-text="Diverse sensors feeding an analysis solution inside a trusted execution environment. Operators have no access to in-use data inside the TEE.":::
66
66
67
67
## Enhanced customer data privacy
68
68
@@ -76,7 +76,7 @@ Confidential computing goes in this direction by allowing customers incremental
76
76
77
77
### Data sovereignty
78
78
79
-
In Government and public agencies, Azure confidential computing is a solution to raise the degree of trust towards the ability to protect data sovereignty in the public cloud. Moreover, thanks to the increasingly adoption of confidential computing capabilities into PaaS services in Azure, a higher degree of trust can be achieved with a reduced impact to the innovation ability provided by public cloud services. This combination of protecting data sovereignity with a reduced impact to the innovation ability makes Azure confidential computing a very effective response to the needs of sovereignty and digital transformation of Government services.
79
+
In Government and public agencies, Azure confidential computing is a solution to raise the degree of trust towards the ability to protect data sovereignty in the public cloud. Moreover, thanks to the increasingly adoption of confidential computing capabilities into PaaS services in Azure, a higher degree of trust can be achieved with a reduced impact to the innovation ability provided by public cloud services. This combination of protecting data sovereignty with a reduced impact to the innovation ability makes Azure confidential computing a very effective response to the needs of sovereignty and digital transformation of Government services.
0 commit comments