Intelligent Machines

Intel Designs a Safe Meeting Place for Private Data

A super-secure place for sensitive data to mingle could free companies to get the benefits of sharing it without risking leaks.

As companies from the financial sector to the health industry amass ever larger, more detailed databases of information about people, it is clear that combining different data sets can offer powerful insights. But to protect users’ privacy, many of these data sets stay locked up inside corporate firewalls.

Chipmaker Intel thinks it has a way to let valuable data be combined and analyzed without endangering anyone’s privacy. Its researchers are testing a super-secure data locker where a company could combine its sensitive data with that from another party without either side risking that raw information being seen or stolen.

The technology could allow companies to do much more with their data, to their benefit and the benefit of their customers. Today, companies either keep their data closely held, or release it with certain details obscured or removed, which limits how useful it can be. Health-related data is particularly limited today, due to HIPAA regulations that govern the sharing of patient records. Two parties using the system need to agree on the analysis to be performed, feed in their data, and then get the results without either side seeing the other’s raw input. The original information is then wiped from the locker. “There are many companies and organizations that own data, and would like to share in a way that [ensures] it is not released or stolen,” says Sridhar Iyengar, a director of security research at Intel Labs. “This is a neutral environment where parties can place their data and derive an answer without revealing their data to one another.”

The project, known as Reliance Point, is a collaboration between Iyengar’s research group and Intel’s data center group. When the Reliance Point system boots up, a security chip is used to check that the BIOS, the lowest-level software on a computer that starts it up, hasn’t been tampered with. The BIOS then makes its own checks before activating the next level of software, which in turn makes its own checks, a chain-like process that continues until the system is fully operational.

All those checks generate data that parties using Reliance Point can use to assure themselves the system can be trusted before they feed in their precious data. “They can have high confidence that the platform has not been tampered with,” says Iyengar.

Gerome Miklau, an associate professor at the University of Massachusetts, Amherst, says that the approach Intel is testing does have the potential to reduce risks of disclosing sensitive information. But he adds that it could be difficult to a find third party that companies would trust to run such a service.

Agreeing on what code is to be run on combined data might also be difficult to negotiate, says Miklau, whose own research examines how to manage and use large-scale data sets without harming privacy. “Verifying that code does what you think it does is always hard,” he adds. “There is also the problem of deciding what the output of the code reveals about the input and whether that disclosure is acceptable.”

Intel is currently working on a larger version of the prototype system, and plans to test it using some real data sets. Nikhil Deshpandea, a senior business strategist at Intel Labs, says doing that should demonstrate what benefits the technology might offer to companies. “There’s a whole bunch of data stuck in these silos because they cannot talk to one another.”

Tech Obsessive?
Become an Insider to get the story behind the story — and before anyone else.

Subscribe today

Uh oh–you've read all of your free articles for this month.

Insider Premium
$179.95/yr US PRICE

More from Intelligent Machines

Artificial intelligence and robots are transforming how we work and live.

Want more award-winning journalism? Subscribe to Insider Premium.
  • Insider Premium {! insider.prices.premium !}*

    {! insider.display.menuOptionsLabel !}

    Our award winning magazine, unlimited access to our story archive, special discounts to MIT Technology Review Events, and exclusive content.

    See details+

    What's Included

    Bimonthly magazine delivery and unlimited 24/7 access to MIT Technology Review’s website

    The Download: our daily newsletter of what's important in technology and innovation

    Access to the magazine PDF archive—thousands of articles going back to 1899 at your fingertips

    Special discounts to select partner offerings

    Discount to MIT Technology Review events

    Ad-free web experience

    First Look: exclusive early access to important stories, before they’re available to anyone else

    Insider Conversations: listen in on in-depth calls between our editors and today’s thought leaders

You've read all of your free articles this month. This is your last free article this month. You've read of free articles this month. or  for unlimited online access.