¡Ø º» »óǰÀº ¿µ¹® ÀÚ·á·Î Çѱ۰ú ¿µ¹® ¸ñÂ÷¿¡ ºÒÀÏÄ¡ÇÏ´Â ³»¿ëÀÌ ÀÖÀ» °æ¿ì ¿µ¹®À» ¿ì¼±ÇÕ´Ï´Ù. Á¤È®ÇÑ °ËÅ並 À§ÇØ ¿µ¹® ¸ñÂ÷¸¦ Âü°íÇØÁֽñ⠹ٶø´Ï´Ù.
ÀÌ º¸°í¼´Â ÇÁ¶óÀ̹ö½Ã Çâ»ó ¹× º¸¾È ÄÄÇ»ÆÃÀ» À§ÇÑ ´Ù¾çÇÑ ±â¼ú ½ÃÀåÀ» Á¶»çÇßÀ¸¸ç, ´Ù¾çÇÑ ±â¼ú ¹× ¼Ö·ç¼Ç °³¿ä, ½ÃÀå ¿µÇâ¿äÀÎ ¹× ½ÃÀå ±âȸ ºÐ¼®, ÁÖ¿ä º¥´õ ºÐ¼® µîÀÇ Á¤º¸¸¦ ´ã°í ÀÖ½À´Ï´Ù.
º¸°í¼ÀÇ ÀåÁ¡:
- ÇÁ¶óÀ̹ö½Ã ¹× ±â¹Ð À¯Áö¸¦ À§ÇØ È°¿ëµÇ´Â ´Ù¾çÇÑ º¸¾È ±â¼úÀÇ »ó¾÷Àû ¹ßÀüÀ» ÀÌÇØÇÒ ¼ö ÀÖ½À´Ï´Ù.
- ´Ù¾çÇÑ ÇÁ¶óÀ̹ö½Ã °È ±â¼ú(PET) ¹× ±â¹Ð ÄÄÇ»ÆÃ(CC)ÀÇ ¼º¼÷À» À§ÇÑ Çö½ÇÀûÀÎ ÀÏÁ¤À» °áÁ¤ÇÒ ¼ö ÀÖ½À´Ï´Ù.
- PET¿Í CC¸¦ Á¦°øÇÏ´Â ´ë»ó ½ÃÀå°ú ºñÁö´Ï½º ¸ðµ¨À» ½Äº°ÇÒ ¼ö ÀÖ½À´Ï´Ù.
ÁÖ¿ä Áú¹®¿¡ ´ëÇÑ ´äº¯:
- ±â¹Ð¼º°ú ÇÁ¶óÀ̹ö½Ã¸¦ À§ÇØ È°¿ëµÇ´Â º¸¾È ±â¼ú¿¡´Â ¾î¶² °ÍµéÀÌ Àִ°¡?
- ¾î¶² °ø±Þ¾÷ü°¡ PET ¹× CC ¼ºñ½º¸¦ Á¦°øÇÏ´ÂÁö, ±×¸®°í ¾î¶² ¹æ½ÄÀ¸·Î Á¦°øÇϴ°¡?
- PET¿Í CCÀÇ ½ÃÀå ±âȸ´Â?
Á¶»ç ÇÏÀ̶óÀÌÆ®:
- ÇöÀç ½ÃÆÇµÇ°í ÀÖ´Â PET ¹× CC ¼Ö·ç¼Ç¿¡ ´ëÇÑ ³ôÀº ¼öÁØÀÇ °³¿ä
- PET ¹× CC º¥´õ »ýŰèÀÇ ½º³À¼¦
- ´Ù¾çÇÑ PET ¹× CC ±â¼úÀÇ TAM
¸ñÂ÷
- ±â¼ú °³¿ä
- ¸ÖƼ ÆÄƼ ÄÄÇ»ÆÃ
- Áص¿Çü ¾ÏÈ£È
- Â÷ºÐ ÇÁ¶óÀ̹ö½Ã
- Á¦·Î Áö½Ä Áõ¸í
- ÇÕ¼º µ¥ÀÌÅÍ
- ¿¬ÇÕ ÇнÀ(Federated Learning)
- TEE(Trusted Execution Environment)
- CC(ÄÁÇǵ§¼È ÄÄÇ»ÆÃ)
- TPM(Æ®·¯½ºÆ¼µå Ç÷§Æû ¸ðµâ)
- HSM(Çϵå¿þ¾î º¸¾È ¸ðµâ)
- ¾ÏȣŰ °ü¸®¿Í °ø°³Å° ÀÎÇÁ¶ó
- ºÐ»ê¿øÀå±â¼ú
- ºÐ¼®
- ¿ä¾à
ksm 23.10.06
Actionable Benefits:
- Understand commercial developments of different security technologies being leveraged for privacy and confidentiality
- Determine a realistic timeline for maturity of various Privacy Enhancing Technologies (PETs) and Confidential Computing (CC).
- Identify target markets and business models for delivery of PET and CC.
Critical Questions Answered:
- What types of security technologies are being leveraged for confidentiality and privacy?
- Which vendors are offering PET and CC services and how are they delivering them?
- What is the market opportunity for PET and CC?
Research Highlights:
- High-level view of PET and CC solutions currently available on the market.
- PET and CC vendor ecosystem snapshot.
- Total Addressable Market (TAM) for various PET and CC technologies.
Who Should Read This?
- Artificial Intelligence (AI)/Machine Learning (ML) developers to understand how to implement privacy and confidentiality.
- Silicon Intellectual Property (IP) and semiconductor manufacturers to develop appropriate underlying secure hardware.
- PET and CC vendors to forge partnerships for integration and interoperability.
- Regulators and standards development organizations in order to assess technology specification maturity.
Table of Contents
- Introduction
- Technology Overview
- Multi-Party Computation
- Homomorphic Encryption
- Differential Privacy
- Zero-Knowledge Proof
- Synthetic Data
- Federated Learning
- Trusted Execution Environment
- Confidential Computing
- Trusted Platform Module
- Hardware Security Module
- Encryption Key Management & Public Key Infrastructure
- Distributed Ledger Technology
- Analysis
- Summary