Skip to content

Commit 2d0ff8d

Browse files
authored
Update use-cases-scenarios.md
1 parent dcc79bd commit 2d0ff8d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/confidential-computing/use-cases-scenarios.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ In this use case, the primary goal is to allow analysis of occupancy data and te
7575

7676
Confidential computing is used here by placing the analysis application inside a TEE where the in-use data is protected by encryption. In this example, the application is running on confidential containers on Azure Container Instances.
7777

78-
The aggregate datasets from many types of sensors and data feeds are managed in an Azure SQL Database with the feature Always Encrypted with secure enclaves. This feature protects in-use queries by encrypting them in memory. The server administrator is prevented from accessing the aggregate dataset while it's being queried and analyzed.
78+
The aggregate datasets from many types of sensors and data feeds are managed in an Azure SQL database with the feature Always Encrypted with secure enclaves. This feature protects in-use queries by encrypting them in memory. The server administrator is prevented from accessing the aggregate dataset while it's being queried and analyzed.
7979

8080
[![Diagram that shows diverse sensors that feed an analysis solution inside a TEE. Operators have no access to in-use data inside the TEE.](media/use-cases-scenarios/iot-sensors.jpg)](media/use-cases-scenarios/iot-sensors.jpg#lightbox)
8181

@@ -149,6 +149,6 @@ Secrets that are being transferred never exist outside an HSM in plaintext form.
149149

150150
## Secure blockchain
151151

152-
A blockchain network is a decentralized network of nodes. These nodes are run and maintained by operators or validators who want to ensure integrity and reach consensus on the state of the network. The nodes are replicas of ledgers and are used to track blockchain transactions. Each node has a full copy of the transaction history, which ensures integrity and availability in a distributed network.
152+
A blockchain network is a decentralized network of nodes. These nodes are run and maintained by operators or validators who want to ensure integrity and reach consensus on the state of the network. The nodes are replicas of ledgers and are used to track blockchain transactions. Each node has a full copy of the transaction history, which helps ensure integrity and availability in a distributed network.
153153

154154
Blockchain technologies built on top of confidential computing can use hardware-based privacy to enable data confidentiality and secure computations. In some cases, the entire ledger is encrypted to safeguard data access. Sometimes the transaction can occur within a compute module inside the enclave within the node.

0 commit comments

Comments
 (0)