eLanka

Tuesday, 23 Sep 2025
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Newsletter
  • eLanka Weddings
  • Property
  • eLanka Shop
  • Business Directory
eLankaeLanka
Font ResizerAa
Search
  • Home
  • Read History
  • Articles
    • eLanka Journalists
  • Events
  • Useful links
    • Obituaries
    • Seeking to Contact
    • eLanka Newsletters
    • eLanka Testimonials
    • Sri Lanka Newspapers
    • Sri Lanka TV LIVE
    • Sri Lanka Radio
    • eLanka Recepies
  • Gallery
  • Contact
Follow US
© 2005 – 2025 eLanka Pty Ltd. All Rights Reserved.
Home » Blog » Articles » Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe
Aditya AbeysingheArticles

Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe

eLanka admin
Last updated: July 17, 2021 2:53 am
By
eLanka admin
ByeLanka admin
Follow:
Share
4 Min Read
SHARE

Ensuring protection in data sharing: Privacy Enhancing Computation

By Aditya Abeysinghe

 

Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to concern about their privacy when communicating over third party applications. While many applications today ensure encryption, masking and other techniques to hide the original form during transmission between two users many say that these techniques are easily decodable by eavesdropping middle parties during transmission. Therefore, research has focused on a new avenue to solve this issue by enforcing technologies that ensure privacy of data. These collections of technologies used for ensuring consumer privacy is called Privacy Enhancing Computation (PEC).

How does PEC ensure privacy?

Data used at present is mainly of two categories: data in use and data at rest. To understand what these two mean, let us take an example of a user utilizing a social media app and is texting some messages to a friend. Data that is texted at the time of texting is data “in use”. If the same user has sent messages previously to his friend, then those data is stored somewhere in data servers for later use. That data which is stored is data “at rest”. PEC concerns about data in use. In other words, data that is transmitted between two or more users.

Consider the same example where two users send messages. Data is encrypted at the user who is the sender of messages and then decrypted at the other user who is the receiver of messages. Both encryption and decryption is done by the social media app they are using, i.e. the middle party with which they are interacting. The main issue in privacy in communications lies in this middle party; can this middle party be trusted? To solve this issue PEC requires a trusted third party where communications are secured and transmitted.

More Read

Kingswood College-eLanka
Kingswood College, Kandy-by Kalani-eLanka
Horton Plains: A Jewel of Sri Lanka’s Highlands – By Malsha – eLanka
Sri Lanka’s Floral Wonder: The 12-Year Bloom of Strobilanthes at Horton Plains – By Bhanuka – eLanka
From Birds to Butterflies: Showcasing Sri Lanka’s Rich Natural Heritage – By Nadeeka – eLanka

Many business applications today use real-time processing of data using various Artificial Intelligence (AI) and Machine Learning (ML) algorithms. This form of analytics use data in use as opposed to analytics on data that is stored. To ensure privacy in such type of analytics, PEC recommends use of privacy-aware ML techniques.

PEC also concerns about computation that transforms data before processing. Several technologies are used for this purpose: differential privacy, secure multiparty computation, homomorphic encryption and trusted execution environments. Of these technologies, homomorphic encryption is considered the most secure, whereas trusted execution environments is considered the least secure technique.

Does PEC solve privacy issues?

More Read

dasun shanaka
Asia Cup 2025: ‘There was a difference of two boundaries’ – Dasun Shanaka rues missed chances after Bangladesh defeat By rathnam_nayak
Sri Lanka’s new wildlife guide: A passport to eco-tourism growth – By Ifham Nizam
Sri Lanka Sets $2.5 Billion Tea Export Target by 2030 with Boost in Production
The Bangkok Gems & Jewellery Fair – By Dr Harold Gunatillake

Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya AbeysinghePEC actually became a real-world solution recently. Hence, the number of applications that are actually using PEC is limited. While research has shown that privacy is secured with advanced cryptographic techniques used in PEC, it has been seldom tested in many general use and specific use applications at present.

For many businesses, PEC is too complex to be implemented as it requires heavy computation on the business side and large investments need to be made to meet these demands. The returns for a business by implementing a PEC solution is debatable as it can cater only a specific set of users with such technologies.

Image Courtesy: https://www.techradar.com

 

 

TAGGED:Aditya AbeysingheArtificial intelligenceMachine LearningPEC solutionPrivacy Enhancing Computation
Share This Article
Email Copy Link Print
Previous Article Australia releases Sri Lankan family from island detention Australia releases Sri Lankan family from island detention
Next Article iLead International Women’s Day Event Sri Lanka iLead International Women’s Day Event Sri Lanka (Video by Roar.lk)
FacebookLike
YoutubeSubscribe
LinkedInFollow
Most Read
10 Pictures With Fascinating Stories Behind Them!

“A PICTURE SPEAKS A 1000 WORDS” – By Des Kelly

Look past your thoughts so you may drink the pure nectar of this moment

A Life Hack for when we’re Burnt Out & Broken Down – By Uma Panch

Narration of the History of our Proud Ancestral (Orang Jawa) Heritage. by Noor R. Rahim

eLanka Weddings

eLanka Marriage Proposals

Noel News

Noel News

Noel News

Noel News- By Noel Whittaker

EILEEN MARY SIBELLE DE SILVA (nee DISSANAYAKE) – 29 September 1922 – 6 April 2018 – A Woman of Value an Appreciation written by Mohini Gunasekera

K.K.S. Cement Factory

Dr.Harold Gunatillake’s 90th Birthday party

Sri Lanka's women's cricket squad in Melbourne

Cricket: Sri Lanka’s women’s squad in Melbourne

- Advertisement -
Ad image
Related News
Elanka newsletter
Articles eLanka Newsletters

eLanka Newsletter -21st September 2025 – 3rd Edition – Sri Lankans In Australia

Articles

Foods that can naturally support better sleep

Articles Photos

Fabulous Sri Lankan fare and great music makes the Springvale RSL the place to be. By Trevine Rodrigo in Melbourne.

Articles Cricket News

Watch Asia Cup 2025 (T20) Sri Lanka Cricket Match Highlights

Elephants-eLanka
Articles

Penetrating Sri Lanka: Foreign Enclaves & Global Powers-by Dr Asoka Bandarage

  • Quick Links:
  • Articles
  • DESMOND KELLY
  • Dr Harold Gunatillake
  • English Videos
  • Sri Lanka
  • Sinhala Videos
  • eLanka Newsletters
  • Obituaries
  • Tamil Videos
  • Dr. Harold Gunatillake
  • Sunil Thenabadu
  • Sinhala Movies
  • Trevine Rodrigo
  • Michael Roberts
  • Photos

eLanka

Your Trusted Source for News & Community Stories: Stay connected with reliable updates, inspiring features, and breaking news. From politics and technology to culture, lifestyle, and events, eLanka brings you stories that matter — keeping you informed, engaged, and connected 24/7.
Kerrie road, Oatlands , NSW 2117 , Australia.
Email : info@eLanka.com.au / rasangivjes@gmail.com.
WhatsApp : +61402905275 / +94775882546

(c) 2005 – 2025 eLanka Pty Ltd. All Rights Reserved.