101 billion. That’s the number of data records compromised in 20201. This made 2020 a record-breaking year for data breaches – the cost per breach also hitting a record high with an average of $4.24 million per incident2.

Modern cryptography has enabled sensitive data to be encrypted at rest and in transit – table stakes for the encryption world. The more challenging area to address is encrypting data while it is in use or being processed in memory. Whether it’s a third party, like a cloud service provider, or your own employee that is processing the data, data in this state can be particularly vulnerable because it must be decrypted to be processed. This missing link of end-to-end encryption can create a window of vulnerability for hackers to exploit and steal data.

Fully Homomorphic Encryption (FHE) is an emerging security technology that allows computations to be performed directly on encrypted data without decrypting it, marking a new paradigm shift for data security. FHE can help support a zero trust strategy by keeping your data, the models that process the data (typically hosted in a cloud or third-party environment) and the results generated encrypted; only the data owner has access to the private key and has the privilege to decrypt. This advanced security approach can help protect your data against external attacks, insider threats stealing intellectual property intentionally or inadvertently and can help provide long-term data protection against quantum attacks.

What’s new?

Last year, we introduced FHE to Linux on Z with our FHE Toolkit. Today, we are announcing the availability of the next evolution of the FHE Toolkit called IBM HElayers3, a software development kit (SDK) for the practical and efficient execution of encrypted workloads using fully homomorphic encrypted data. HElayers is designed to enable application developers and data scientists to seamlessly apply advanced privacy preserving techniques without requiring specialized skills in cryptography – all while working in newly integrated Python and C++ environments. The images for the Python and C++ kits are provided under a community edition license for non-commercial use. Customers who want to access advanced features and plan for commercial-grade deployment using HElayers can engage through the Premium Edition Program by contacting the IBM FHE team at FHEstart@us.ibm.com.

HElayers is engineered to support a wide selection of analytics such as linear regression, logistic regression, and neural networks so that application developers and data scientists can use the power of FHE. It is delivered as an open platform that is capable of using the latest FHE schemes and libraries and ships with a multitude of tutorials and sample applications that highlight the basics of FHE and how to use this technology in a practical way. Sample applications include credit card fraud detection, encrypted database search, text classification, and various examples from the healthcare industry.

Try it for yourself

It seems daily that we see news about data breaches and inadvertent disclosures of information. In a real sense, data privacy has gone from something discussed in a company boardroom to something that is now discussed at the dinner table with family and friends. Today, our goal is to make HElayers accessible to anyone with an internet connection. Try HElayers for yourself including tutorials, sample applications and documentation for Linux on Z by downloading the images from Docker Hub using the following links:

Take a look at our in-depth walkthrough video on how to download and get started with HElayers.

>> To help us create the best possible offering tailored to your needs, please provide feedback by taking the HElayers Experience Survey.

Was this article helpful?
YesNo

More from Cloud

The history of the central processing unit (CPU)

10 min read - The central processing unit (CPU) is the computer’s brain. It handles the assignment and processing of tasks, in addition to functions that make a computer run. There’s no way to overstate the importance of the CPU to computing. Virtually all computer systems contain, at the least, some type of basic CPU. Regardless of whether they’re used in personal computers (PCs), laptops, tablets, smartphones or even in supercomputers whose output is so strong it must be measured in floating-point operations per…

A clear path to value: Overcome challenges on your FinOps journey 

3 min read - In recent years, cloud adoption services have accelerated, with companies increasingly moving from traditional on-premises hosting to public cloud solutions. However, the rise of hybrid and multi-cloud patterns has led to challenges in optimizing value and controlling cloud expenditure, resulting in a shift from capital to operational expenses.   According to a Gartner report, cloud operational expenses are expected to surpass traditional IT spending, reflecting the ongoing transformation in expenditure patterns by 2025. FinOps is an evolving cloud financial management discipline…

IBM Power8 end of service: What are my options?

3 min read - IBM Power8® generation of IBM Power Systems was introduced ten years ago and it is now time to retire that generation. The end-of-service (EoS) support for the entire IBM Power8 server line is scheduled for this year, commencing in March 2024 and concluding in October 2024. EoS dates vary by model: 31 March 2024: maintenance expires for Power Systems S812LC, S822, S822L, 822LC, 824 and 824L. 31 May 2024: maintenance expires for Power Systems S812L, S814 and 822LC. 31 October…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters