101 billion. That’s the number of data records compromised in 20201. This made 2020 a record-breaking year for data breaches – the cost per breach also hitting a record high with an average of $4.24 million per incident2.

Modern cryptography has enabled sensitive data to be encrypted at rest and in transit – table stakes for the encryption world. The more challenging area to address is encrypting data while it is in use or being processed in memory. Whether it’s a third party, like a cloud service provider, or your own employee that is processing the data, data in this state can be particularly vulnerable because it must be decrypted to be processed. This missing link of end-to-end encryption can create a window of vulnerability for hackers to exploit and steal data.

Fully Homomorphic Encryption (FHE) is an emerging security technology that allows computations to be performed directly on encrypted data without decrypting it, marking a new paradigm shift for data security. FHE can help support a zero trust strategy by keeping your data, the models that process the data (typically hosted in a cloud or third-party environment) and the results generated encrypted; only the data owner has access to the private key and has the privilege to decrypt. This advanced security approach can help protect your data against external attacks, insider threats stealing intellectual property intentionally or inadvertently and can help provide long-term data protection against quantum attacks.

What’s new?

Last year, we introduced FHE to Linux on Z with our FHE Toolkit. Today, we are announcing the availability of the next evolution of the FHE Toolkit called IBM HElayers3, a software development kit (SDK) for the practical and efficient execution of encrypted workloads using fully homomorphic encrypted data. HElayers is designed to enable application developers and data scientists to seamlessly apply advanced privacy preserving techniques without requiring specialized skills in cryptography – all while working in newly integrated Python and C++ environments. The images for the Python and C++ kits are provided under a community edition license for non-commercial use. Customers who want to access advanced features and plan for commercial-grade deployment using HElayers can engage through the Premium Edition Program by contacting the IBM FHE team at FHEstart@us.ibm.com.

HElayers is engineered to support a wide selection of analytics such as linear regression, logistic regression, and neural networks so that application developers and data scientists can use the power of FHE. It is delivered as an open platform that is capable of using the latest FHE schemes and libraries and ships with a multitude of tutorials and sample applications that highlight the basics of FHE and how to use this technology in a practical way. Sample applications include credit card fraud detection, encrypted database search, text classification, and various examples from the healthcare industry.

Try it for yourself

It seems daily that we see news about data breaches and inadvertent disclosures of information. In a real sense, data privacy has gone from something discussed in a company boardroom to something that is now discussed at the dinner table with family and friends. Today, our goal is to make HElayers accessible to anyone with an internet connection. Try HElayers for yourself including tutorials, sample applications and documentation for Linux on Z by downloading the images from Docker Hub using the following links:

Take a look at our in-depth walkthrough video on how to download and get started with HElayers.

>> To help us create the best possible offering tailored to your needs, please provide feedback by taking the HElayers Experience Survey.

Was this article helpful?
YesNo

More from Cloud

Fortressing the digital frontier: A comprehensive look at IBM Cloud network security services

6 min read - The cloud revolution has fundamentally transformed how businesses operate. Its superior scalability, agility and cost-effectiveness have made it the go-to platform for organizations of all sizes. However, this shift to the cloud has introduced a new landscape of ever-evolving security threats. Data breaches and cyberattacks continue to hit organizations, making robust cloud network security an absolute necessity. IBM®, a titan in the tech industry, recognizes this critical need, provides a comprehensive suite of tools and offers unmatched expertise to fortify…

How well do you know your hypervisor and firmware?

6 min read - IBM Cloud® Virtual Private Cloud (VPC) is designed for secured cloud computing, and several features of our platform planning, development and operations help ensure that design. However, because security in the cloud is typically a shared responsibility between the cloud service provider and the customer, it’s essential for you to fully understand the layers of security that your workloads run on here with us. That’s why here, we detail a few key security components of IBM Cloud VPC that aim…

New IBM study: How business leaders can harness the power of gen AI to drive sustainable IT transformation

3 min read - As organizations strive to balance productivity, innovation and environmental responsibility, the need for sustainable IT practices is even more pressing. A new global study from the IBM Institute for Business Value reveals that emerging technologies, particularly generative AI, can play a pivotal role in advancing sustainable IT initiatives. However, successful transformation of IT systems demands a strategic and enterprise-wide approach to sustainability. The power of generative AI in sustainable IT Generative AI is creating new opportunities to transform IT operations…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters