Thursday, 13 August 2020 11:19

Confidential computing is part of IBM's cloud vision

IBM Z Hybrid Cloud vice president Rohit Badlaney IBM Z Hybrid Cloud vice president Rohit Badlaney

IBM has been working on confidential computing technologies for more than a decade, IBM Z Hybrid Cloud vice president Rohit Badlaney told iTWire.

These technologies have been made available in the IBM public cloud for several years, he said. Trusted execution showed up as part of IBM's blockchain platform as a service in 2016, and two years later the Hyper Protect family of cloud services applied confidential computing more broadly.

Hyper Protect includes a cryptographic service, integrity services, database as a service (Postgres and Mongo), and virtual machines as a service.

IBM's approach means that the company is unable to access clients' data in these environments as a matter of technology, whereas competing cloud providers rely on operational protections.

These protections aren't just available to applications running entirely in the IBM public cloud. For example, the IBM Hyper Protect Software Development Kit for iOS allows developers to create iPad and iPhone apps to access data that's protected by the IBM cloud, and the Temenos banking software has a hybrid model allowing it to run on traditional systems while using the IBM cloud as its data protection layer.

"We've got the whole family [of trusted services] now generally available," said Badlaney, and the company intends to make them available in all zones by 2021.

IBM is also launching a set of fully homomorphic encryption toolkits, initially for macOS and iOS, and more recently for Linux. An Android version is said to be coming soon.

Homomorphic encryption allows data to be analysed or manipulated without being decrypted. "we've been focused on this space for a while," he said.

"This is meant for the most regulated industries," but greater adoption is occurring.

It can be hard to encrypt all data using conventional methods, as that requires complicated configurations, explained IBM distinguished engineer Rebecca Gott. But fully homomorphic encryption keeps everything encrypted. This is "the highest level of security by default, which is unchangeable," she said, so security settings are "baked in."

Subscribe to ITWIRE UPDATE Newsletter here

Active Vs. Passive DWDM Solutions

An active approach to your growing optical transport network & connectivity needs.

Building dark fibre network infrastructure using WDM technology used to be considered a complex challenge that only carriers have the means to implement.

This has led many enterprises to build passive networks, which are inferior in quality and ultimately limit their future growth.

Why are passive solutions considered inferior? And what makes active solutions great?

Read more about these two solutions, and how PacketLight fits into all this.


WEBINAR INVITE 8th & 10th September: 5G Performing At The Edge

Don't miss the only 5G and edge performance-focused event in the industry!

Edge computing will play a critical part within digital transformation initiatives across every industry sector. It promises operational speed and efficiency, improved customer service, and reduced operational costs.

This coupled with the new capabilities 5G brings opens up huge opportunities for both network operators and enterprise organisations.

But these technologies will only reach their full potential with assured delivery and performance – with a trust model in place.

With this in mind, we are pleased to announce a two-part digital event, sponsored by Accedian, on the 8th & 10th of September titled 5G: Performing at the Edge.


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News