Our solution allows you to store and retrieve data from an untrusted Cloud. This requires innovation beyond encryption: even if the data is encrypted, the Cloud can still see what portions you have accessed and what you were looking for. In addition to encrypting the data, you must also protect the search queries as well as the access pattern in order to truly hide your information from the Cloud. We provide a searchable encryption solution that provides a highly efficiency encrypted index mechanism while completely hiding the query and the search pattern from an untrusted Cloud hosting the data and responding to queries. Several universities and laboratories have independently tested and benchmarked our solution.
Often times data from different datasets provide much more insight when analyzed in aggregate than would be possible from the analysis of any single dataset. However, the contributors and administrators of the data may not be able to share it with other parties due to liability issues, privacy laws and regulations, or company policy that prohibits disclosing proprietary information that could provide a competitive advantage. We provide a platform for performing analytics and computation on multiple datasets from mutually distrusting parties, where none of the parties need reveal their data to any other party (nor to any external service).
As more and more of our lives, products, and services become digitized and interconnected, privacy and security is needed now more than ever. We apply cryptographically sound solutions to a variety of devices and platforms. These include mobile devices, low power devices, and IoT devices using research and development from our projects that have also been independently tested.
Typically, one can encrypt data to protect it at rest or in transit. However, the utility of data often comes from the use and combination with other data that may be owned by another entity. Often this means temporarily sacrificing privacy and security by decrypting the data with a third party or in an enclave. Immense value can be gained from being able to analyze the joint data yet there is an inherent tension between privacy, security, and utility. Our tools allow everyone to perform computations and extract the outcomes of data analyses without ever having to decrypt the data or share private information with anyone. These solutions have broad applicability to secure data science and analytics, finance, healthcare, navigational systems, logitics, and cyber forensics.
We have developed a new technology for privacy preserving data mining, which allows users to execute a private search on vast amounts of data in a distributed public or private environment, storing results in a small encrypted buffer. We stress that the search program provably contains no information about the search criteria. This technology can also be used to securely distribute and update data as well as assist in the sharing of data with multiple partners.