ãã®ããã¥ã¡ã³ãã§ã¯ãConfidential Computing ã®æŠèŠãšãå®å šãªããŒã¿ ã³ã©ãã¬ãŒã·ã§ã³ãAI ã¢ãã«ã®ãã¬ãŒãã³ã°ããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ã« Confidential Computing ã䜿çšããæ¹æ³ã«ã€ããŠèª¬æããŸãããã®ããã¥ã¡ã³ãã§ã¯ãGoogle Cloud ã® Confidential Computing ãµãŒãã¹ãšãããŸããŸãªãŠãŒã¹ã±ãŒã¹ã®ã¢ãŒããã¯ã㣠ãªãã¡ã¬ã³ã¹ã«ã€ããŠã説æããŸãã
ãã®ããã¥ã¡ã³ãã¯ããã¯ãããžãŒ ãšã°ãŒã¯ãã£ãããéèãµãŒãã¹ãå»çãªã©ãããŸããŸãªæ¥çã«ãããçæ AI ãšå¿çš AI ã䜿çšããã³ã³ãã£ãã³ã·ã£ã« ã³ã³ãã¥ãŒãã£ã³ã°ã®ããžãã¹äžã®å¯èœæ§ãçè§£ããã®ã«åœ¹ç«ã€ããšãç®çãšããŠããŸãã
Confidential Computing ãšã¯
åŸæ¥ã®ããŒã¿ã»ãã¥ãªãã£å¯Ÿçã¯ãæå·åã«ããä¿åããŒã¿ãšè»¢éäžããŒã¿ã®ä¿è·ãäžå¿ãšããŠããŸãããConfidential Computing ã¯ãã¢ã¯ãã£ããªäœ¿çšäžã®ããŒã¿ã®è匱æ§ã«å¯ŸåŠããããšã§ãæ°ããä¿è·ã¬ã€ã€ã远å ããŸãããã®æè¡ã«ãããæ©å¯æ å ±ã¯åŠçäžãæ©å¯æ§ãç¶æããããããããŒã¿ ã»ãã¥ãªãã£ã®é倧ãªã®ã£ãããåããããšãã§ããŸãã
Confidential Computing ç°å¢ã¯ãããŒããŠã§ã¢ããŒã¹ã®é«ä¿¡é Œå®è¡ç°å¢ïŒTEEïŒã䜿çšããŠã䜿çšäžã®ããŒã¿ãä¿è·ããŸããTEE ã¯ãããã»ããµå ã®å®å šãªé åã§ãå éšã«èªã¿èŸŒãŸããã³ãŒããšããŒã¿ã®æ©å¯æ§ãšå®å šæ§ãä¿è·ããŸããTEE ã¯æ©å¯æ§ã®é«ããªãã¬ãŒã·ã§ã³ã®ããã®å®å šãªéšå±ãšããŠæ©èœããã·ã¹ãã ã䟵害ãããå Žåã§ãããŒã¿ã®ãªã¹ã¯ã軜æžããŸããConfidential Computing ã䜿çšãããšãåŠçäžã«ã¡ã¢ãªå ã®ããŒã¿ãæå·åãããŸãŸã«ã§ããŸãã
ããšãã°ãããŒã¿åæãš ML ã« Confidential Computing ã䜿çšãããšã次ã®ããšãå®çŸã§ããŸãã
- ãã©ã€ãã·ãŒã®åŒ·å: åºç€ãšãªãã€ã³ãã©ã¹ãã©ã¯ãã£ãèšç®ã«é¢äžããåœäºè ã«ããŒã¿ãå ¬éããããšãªããæ©å¯æ§ã®é«ãããŒã¿ã»ããïŒå»çèšé²ã財åããŒã¿ãªã©ïŒã®åæãå®è¡ããŸãã
- å®å šãªã³ã©ãã¬ãŒã·ã§ã³: åã ã®ããŒã¿ãäºãã«é瀺ããããšãªããè€æ°ã®ããŒãã£ã®çµåããŒã¿ã»ããã§æ©æ¢°åŠç¿ã¢ãã«ãå ±åã§ãã¬ãŒãã³ã°ããããåæãå®è¡ãããããŸããæ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ã¯ä¿¡é Œãè²ã¿ãç¹ã«å»çãéèãªã©ã®åéã§ãããå ç¢ã§äžè¬åå¯èœãªã¢ãã«ã®éçºãå¯èœã«ããŸãã
- ããŒã¿ ã»ãã¥ãªãã£ã®åäž: ããŒã¿äŸµå®³ãäžæ£ã¢ã¯ã»ã¹ã®ãªã¹ã¯ã軜æžããäžè¬ããŒã¿ä¿è·èŠåïŒGDPRïŒãå»çä¿éºã®çžäºéçšæ§ãšèª¬æè²¬ä»»ã«é¢ããæ³åŸïŒHIPAAïŒãªã©ã®ããŒã¿ä¿è·èŠå¶ãéµå®ããŸãã
- ä¿¡é Œæ§ãšéææ§ã®åäž: èšç®ãæå³ããããŒã¿ã«å¯ŸããŠå®å šãªç°å¢ã§å®è¡ãããããšãæ€èšŒå¯èœãªèšŒæ ãšããŠæäŸããé¢ä¿è ã®ä¿¡é Œãé«ããŸãã
Confidential Computing ç°å¢ã®ä»çµã¿
æ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ç°å¢ã«ã¯æ¬¡ã®ããããã£ããããŸãã
- ã©ã³ã¿ã€ã æå·å: ããã»ããµã¯ããã¹ãŠã® Confidential Computing ç°å¢ããŒã¿ãã¡ã¢ãªå ã§æå·åãããç¶æ ã«ä¿ã¡ãŸããã¡ã¢ãªããçŽæ¥ã³ã³ãã£ãã³ã·ã£ã« ã³ã³ãã¥ãŒãã£ã³ã°ç°å¢ã®ããŒã¿ãèªã¿åãããšããã·ã¹ãã ã³ã³ããŒãã³ããŸãã¯ããŒããŠã§ã¢æ»æè ã¯ãæå·åãããããŒã¿ãã確èªã§ããŸãããåæ§ã«ãæå·åã«ãããã¡ã¢ãªãžã®çŽæ¥ã¢ã¯ã»ã¹ã«ãã Confidential Computing ç°å¢ããŒã¿ã®å€æŽãé²ãããšãã§ããŸãã
- åé¢: ããã»ããµã¯ãConfidential Computing ç°å¢ãžã®ãœãããŠã§ã¢ ããŒã¹ã®ã¢ã¯ã»ã¹ããããã¯ããŸãããªãã¬ãŒãã£ã³ã° ã·ã¹ãã ãä»ã®ã¢ããªã±ãŒã·ã§ã³ã¯ãç¹å®ã®ã€ã³ã¿ãŒãã§ãŒã¹ãä»ããŠã®ã¿ãæ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ç°å¢ãšéä¿¡ã§ããŸãã
èšŒææž: Confidential Computing ã®ã³ã³ããã¹ãã§ã¯ãèšŒææžã¯ Confidential Computing ç°å¢ã®ä¿¡é Œæ§ãæ€èšŒããŸããæ§æèšŒæã䜿çšãããšãTEE ã€ã³ã¹ã¿ã³ã¹ãèªèšŒã§ããããããŠãŒã¶ãŒã¯ Confidential Computing ãããŒã¿ãä¿è·ããŠãã蚌æ ã確èªã§ããŸãã
æ§æèšŒæããã»ã¹ã§ã¯ãTEE ããµããŒããã CPU ãããããã€ã³ã¹ã¿ã³ã¹ã®æž¬å®å€ã®æå·çœ²åä»ãã¬ããŒãïŒæ§æèšŒæã¬ããŒãïŒãçæããŸããæž¬å®çµæã¯ãæ§æèšŒæãµãŒãã¹ã«éä¿¡ãããŸããããã»ã¹åé¢ã®æ§æèšŒæã¯ãã¢ããªã±ãŒã·ã§ã³ãèªèšŒããŸããVM åé¢ã®æ§æèšŒæã¯ãVMãVM ã®èµ·åã«äœ¿çšãããä»®æ³ãã¡ãŒã ãŠã§ã¢ããŸãã¯ãã®äž¡æ¹ãèªèšŒããŸãã
ããŒã¿ ã©ã€ããµã€ã¯ã«ã®ã»ãã¥ãªãã£: Confidential Computing ã¯ã䜿çšäžã®ããŒã¿ã«å¯ŸããŠããŒããŠã§ã¢ããŒã¹ã®ä¿è·ãæäŸããå®å šãªåŠçç°å¢ãæ§ç¯ããŸãã
Confidential Computing ãã¯ãããžãŒ
次ã®ãã¯ãããžãŒã«ãããConfidential Computing ãæå¹ã«ãªããŸãã
- ã»ãã¥ã¢ ãšã³ã¯ã¬ãŒãïŒã¢ããªã±ãŒã·ã§ã³ ããŒã¹ã®ã³ã³ãã£ãã³ã·ã£ã« ã³ã³ãã¥ãŒãã£ã³ã°ãšãåŒã°ããŸãïŒ
- Confidential VMs ãš GPUïŒVM ããŒã¹ã® Confidential Computing ãšãåŒã°ããŸãïŒ
Google Cloud ã¯ãConfidential VMs ã䜿çšã㊠Confidential Computing ãæå¹ã«ããŸãã詳现ã«ã€ããŠã¯ãGoogle Cloudã« Confidential Computing ãå®è£ ãããã芧ãã ããã
ã»ãã¥ã¢ ãšã³ã¯ã¬ãŒã
ã»ãã¥ã¢ ãšã³ã¯ã¬ãŒãã¯ãããŒããŠã§ã¢ ããŒã¹ã®åé¢ã䜿çšãããããã€ããŒãã€ã¶ããã©ã¹ããã ã³ã³ãã¥ãŒãã£ã³ã° ããŒã¹ïŒTCBïŒå ã«é 眮ã㊠VM å šäœãåé¢ããããšã§ããªãã¬ãŒãã£ã³ã° ã·ã¹ãã ããã³ãŒããšããŒã¿ãåé¢ããã³ã³ãã¥ãŒãã£ã³ã°ç°å¢ã§ããã»ãã¥ã¢ ãšã³ã¯ã¬ãŒãã¯ããã·ã³ãšãªãã¬ãŒãã£ã³ã° ã·ã¹ãã ãžã®ç©çã¢ã¯ã»ã¹ãŸãã¯ã«ãŒãã¢ã¯ã»ã¹æš©ãæã€ãŠãŒã¶ãŒã§ãã£ãŠããã»ãã¥ã¢ ãšã³ã¯ã¬ãŒãã®ã¡ã¢ãªã®å 容ãç¥ãããšãã§ããããšã³ã¯ã¬ãŒãå ã®ã³ãŒãã®å®è¡ãæ¹ããã§ããªãããã«èšèšãããŠããŸããã»ãã¥ã¢ ãšã³ã¯ã¬ãŒãã®äŸãšããŠã¯ãIntel Software Guard ExtensionïŒSGXïŒããããŸãã
Confidential VMs ãš confidential GPU
Confidential VM ã¯ãããŒããŠã§ã¢ ããŒã¹ã®ã¡ã¢ãªæå·åã䜿çšããŠããŒã¿ãšã¢ããªã±ãŒã·ã§ã³ãä¿è·ãã VM ã®äžçš®ã§ããConfidential VM ã¯ãåé¢ãšèªèšŒãæäŸããŠã»ãã¥ãªãã£ã匷åããŸããConfidential VM ã®ã³ã³ãã¥ãŒãã£ã³ã° ãã¯ãããžãŒã«ã¯ãAMD SEVãAMD SEV-SNPãã€ã³ãã« TDXãArm CCAãIBM ZãIBM LinuxONEãNvidia Confidential GPU ããããŸãã
Confidential GPU ã¯ãç¹ã«ã¯ã©ãŠãç°å¢ãå ±æç°å¢ã§ãããŒã¿ã®ä¿è·ãšã³ã³ãã¥ãŒãã£ã³ã°ã®é«éåã«åœ¹ç«ã¡ãŸããããŒããŠã§ã¢ ããŒã¹ã®æå·åãšå颿è¡ã䜿çšããŠãGPU ã§åŠçäžã®ããŒã¿ãä¿è·ããã¯ã©ãŠã ãããã€ããæªæã®ããè¡çºè ã§ããæ©å¯æ å ±ã«ã¢ã¯ã»ã¹ã§ããªãããã«ããŸãã
æ©å¯ããŒã¿åæãAIããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ã®ãŠãŒã¹ã±ãŒã¹
以éã®ã»ã¯ã·ã§ã³ã§ã¯ãããŸããŸãªæ¥çã® Confidential Computing ã®ãŠãŒã¹ã±ãŒã¹ã®äŸã瀺ããŸãã
å»çãšã©ã€ã ãµã€ãšã³ã¹
Confidential Computing ã䜿çšãããšãæ£è ã®ãã©ã€ãã·ãŒãä¿è·ããªãããçµç¹éã§å®å šã«ããŒã¿ãå ±æããŠåæã§ããŸããConfidential Computing ã䜿çšãããšãå»çæ©é¢ã¯å ±åç ç©¶ãç æ°ã®ã¢ããªã³ã°ãæ°è¬éçºãåå¥åæ²»çèšç»ã«åå ã§ããŸãã
次ã®è¡šã«ãå»çåéã§ã®ã³ã³ãã¥ãŒãã£ã³ã°ã®çšéäŸã瀺ããŸãã
ãŠãŒã¹ã±ãŒã¹ | 説æ |
---|---|
ç æ°ã®äºæž¬ã𿩿çºèŠ |
ç é¢ã¯ãæ£è ã®æ©å¯æ§ãç¶æããªãããå»çç»åããŒã¿ïŒè€æ°ã®ç é¢ãŸãã¯ç é¢ã®å°åã«ããã MRI ã¹ãã£ã³ã CT ã¹ãã£ã³ãªã©ïŒããããæ§ç å€ãæ€åºãããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ã¢ãã«ããã¬ãŒãã³ã°ããŸãã |
ãªã¢ã«ã¿ã€ã ã®æ£è ã¢ãã¿ãªã³ã° |
å»çæäŸè ã¯ããŠã§ã¢ã©ãã« ãã«ã¹ ããã€ã¹ãã¢ãã€ã« ãã«ã¹ã¢ããªã®ããŒã¿ãåæããŠããªã¢ã«ã¿ã€ã ã®ã¢ãã¿ãªã³ã°ãšã¢ã©ãŒããè¡ããŸããããšãã°ããŠã§ã¢ã©ãã« ããã€ã¹ã¯è¡ç³å€ãèº«äœæŽ»åãé£ç掻ã«é¢ããããŒã¿ãåéããè¡ç³å€ã®å€åã«é¢ããããŒãœãã©ã€ãºããããããããæ©æèŠåãæäŸããŸãã |
å ±ååµè¬ |
補è¬äŒç€Ÿã¯ãç¬èªã®ããŒã¿ã»ããã§ã¢ãã«ããã¬ãŒãã³ã°ããŠãæ°è¬éçºãå éãããç¥ç財ç£ãä¿è·ããªããã³ã©ãã¬ãŒã·ã§ã³ã匷åããŸãã |
éèãµãŒãã¹
Confidential Computing ã䜿çšãããšãéèæ©é¢ã¯ããå®å šã§åŸ©å åã®é«ãéèã·ã¹ãã ãæ§ç¯ã§ããŸãã
次ã®è¡šã«ãéèãµãŒãã¹ã«ããã Confidential Computing ã®äœ¿çšäŸã瀺ããŸãã
ãŠãŒã¹ã±ãŒã¹ | 説æ |
---|---|
éèç¯çœª |
éèæ©é¢ã¯ã顧客ã®ãã©ã€ãã·ãŒãä¿è·ããªãããäžå¯©ãªååŒã«é¢ããæ å ±ãå ±æããããšã§ããã㌠ãã³ããªã³ã°é²æ¢ïŒAMLïŒãäžè¬çãªäžæ£è¡çºã¢ãã«ã®åãçµã¿ã§é£æºã§ããŸããConfidential Computing ã䜿çšãããšãæ©é¢ã¯å ±æããŒã¿ãå®å šã«åæããè€éãªãã㌠ãã³ããªã³ã°ã®ã¹ããŒã ããã广çã«ç¹å®ããŠé»æ¢ããã¢ãã«ããã¬ãŒãã³ã°ã§ããŸãã |
ãã©ã€ãã·ãŒä¿è·åã®ä¿¡çšãªã¹ã¯è©äŸ¡ |
èè³æ©é¢ã¯ãä»ã®éèæ©é¢ãééèæ©é¢ã®ããŒã¿ãªã©ãããåºç¯ãªããŒã¿ãœãŒã¹ã䜿çšããŠä¿¡çšãªã¹ã¯ãè©äŸ¡ã§ããŸããConfidential Computing ã䜿çšãããšã貞ãæã¯ããŒã¿ãäžæ£ãªç¬¬äžè ã«å ¬éããããšãªãããã®ããŒã¿ã«ã¢ã¯ã»ã¹ããŠåæã§ããŸããããã«ãããããŒã¿ ãã©ã€ãã·ãŒãç¶æããªãããã¯ã¬ãžãã ã¹ã³ã¢ãªã³ã° ã¢ãã«ã®ç²ŸåºŠãé«ããããšãã§ããŸãã |
ãã©ã€ãã·ãŒä¿è·äŸ¡æ Œæ€åº |
éèã®äžçãç¹ã«åºé åžå Žãæµåæ§ã®äœãè³ç£ãªã©ã®åéã§ã¯ãæ£ç¢ºãªäŸ¡æ Œèšå®ãäžå¯æ¬ ã§ããæ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ã䜿çšãããšãè€æ°ã®æ©é¢ãäºãã«æ©å¯ããŒã¿ãå ¬éããããšãªããæ£ç¢ºãªäŸ¡æ Œãå ±åã§èšç®ã§ããŸãã |
å ¬å ±éšé
Confidential Computing ã䜿çšãããšãæ¿åºã¯ããŒã¿ã®å¶åŸ¡ãšäž»æš©ãç¶æããªãããããéææ§ãå¹çæ§ãæå¹æ§ã®é«ããµãŒãã¹ãæ§ç¯ã§ããŸãã
次ã®è¡šã«ãå ¬å ±éšéã§ã® Confidential Computing ã®äœ¿çšäŸã瀺ããŸãã
ãŠãŒã¹ã±ãŒã¹ | 説æ |
---|---|
ããžã¿ã«äž»æš© |
Confidential Computing ã«ãããããŒã¿ã¯åŠçäžã§ãã£ãŠãåžžã«æå·åãããŸããããã«ããããã€ããªãã ã¯ã©ãŠãããããªã㯠ã¯ã©ãŠãããã«ãã¯ã©ãŠãç°å¢ã§ãå€éšã€ã³ãã©ã¹ãã©ã¯ãã£ã§ãã¹ããããŠããå Žåã§ããããŒã¿ãä¿è·ããªãããåœæ°ã®ããŒã¿ãå®å šã«ã¯ã©ãŠãã«ç§»è¡ã§ããŸããConfidential Computing ã¯ãããžã¿ã«äž»æš©ãšããžã¿ã«èªåŸæ§ããµããŒããã匷åããŸãã䜿çšäžã®ããŒã¿ã®è¿œå ã®å¶åŸ¡ãšä¿è·ã«ãããã¯ã©ãŠã ãããã€ããæå·éµã«ã¢ã¯ã»ã¹ã§ããªãããã«ããŸãã |
è€æ°æ©é¢ã®æ©å¯åæ |
æ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ã«ãããè€æ°ã®æ¿åºæ©é¢ïŒå»çãçšåãæè²ãªã©ïŒéããŸãã¯ç°ãªãå°åãåœã®è€æ°ã®æ¿åºéã§ããã«ãããŒã㣠ããŒã¿åæãå¯èœã«ãªããŸããConfidential Computing ã¯ãä¿¡é Œå¢çãšããŒã¿ ãã©ã€ãã·ãŒãä¿è·ããªãããããŒã¿åæïŒããŒã¿æå€±é²æ¢ïŒDLPïŒãå€§èŠæš¡åæãããªã·ãŒ ãšã³ãžã³ã䜿çšïŒãš AI ã®ãã¬ãŒãã³ã°ãšãµãŒãã³ã°ãå¯èœã«ããŸãã |
ä¿¡é Œã§ãã AI |
æ¿åºæ©é¢ã®ããŒã¿ã¯éèŠã§ãããä¿¡é Œã§ããæ¹æ³ã§ãã©ã€ããŒã AI ã¢ãã«ã®ãã¬ãŒãã³ã°ã«äœ¿çšããŠãå éšãµãŒãã¹ãšåžæ°ãšã®ããåããæ¹åã§ããŸããæ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ã«ãããä¿¡é Œã§ãã AI ãã¬ãŒã ã¯ãŒã¯ãå¯èœã«ãªããŸããæ©å¯ããã³ãããæ©å¯æ€çŽ¢æ¡åŒµçæïŒRAGïŒãã¬ãŒãã³ã°ã«ãããåžæ°ã®ããŒã¿ãšã¢ãã«ã®ãã©ã€ãã·ãŒãšã»ãã¥ãªãã£ãç¶æã§ããŸãã |
ãµãã©ã€ ãã§ãŒã³
Confidential Computing ã䜿çšãããšãçµç¹ã¯ãµãã©ã€ ãã§ãŒã³ãšæç¶å¯èœæ§ã管çããããŒã¿ã®ãã©ã€ãã·ãŒãç¶æããªããå ±åäœæ¥ãè¡ããåææ å ±ãå ±æã§ããŸãã
次ã®è¡šã«ããµãã©ã€ ãã§ãŒã³ã§ã® Confidential Computing ã®äœ¿çšäŸã瀺ããŸãã
ãŠãŒã¹ã±ãŒã¹ | 説æ |
---|---|
éèŠäºæž¬ãšåšåº«ã®æé©å |
æ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ã䜿çšãããšãåäŒæ¥ã¯ç¬èªã®è²©å£²ããŒã¿ãšåšåº«ããŒã¿ã«åºã¥ããŠç¬èªã®éèŠäºæž¬ã¢ãã«ããã¬ãŒãã³ã°ã§ããŸãããããã®ã¢ãã«ã¯å®å šã«éçŽãããŠã°ããŒãã« ã¢ãã«ã«ãªãããµãã©ã€ ãã§ãŒã³å šäœã®éèŠãã¿ãŒã³ãããæ£ç¢ºãã€å æ¬çã«ææ¡ã§ããŸãã |
ãã©ã€ãã·ãŒä¿è·ãµãã©ã€ã€ãŒã®ãªã¹ã¯è©äŸ¡ |
ãµãã©ã€ã€ãŒã®ãªã¹ã¯è©äŸ¡ã«é¢äžããåçµç¹ïŒè³Œå ¥è ãéèæ©é¢ãç£æ»äººãªã©ïŒã¯ãç¬èªã®ããŒã¿ã§ç¬èªã®ãªã¹ã¯è©äŸ¡ã¢ãã«ããã¬ãŒãã³ã°ããŸãããããã®ã¢ãã«ãéçŽããŠãå æ¬çã§ãã©ã€ãã·ãŒãä¿è·ãããµãã©ã€ã€ãŒ ãªã¹ã¯ ãããã¡ã€ã«ãäœæããŸããããã«ããããµãã©ã€ã€ãŒ ãªã¹ã¯ã®æ©æç¹å®ããµãã©ã€ ãã§ãŒã³ã®å埩åã®åäžããµãã©ã€ã€ãŒã®éžæãšç®¡çã«ãããæææ±ºå®ã®æ¹åãå¯èœã«ãªããŸãã |
æž©å®€å¹æã¬ã¹æåºéã®è¿œè·¡ãšåæž |
Confidential Computing ã¯ãã«ãŒãã³ ãããããªã³ãã®è¿œè·¡ãšåæžã®åãçµã¿ã«ãããããŒã¿ ãã©ã€ãã·ãŒãšéææ§ã®èª²é¡ã«åãçµãããã®ãœãªã¥ãŒã·ã§ã³ãæäŸããŸããæ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ã«ãããçµç¹ã¯æªå å·¥ã®ããŒã¿ãå ¬éããããšãªãããŒã¿ãå ±æããŠåæã§ããŸããããã«ãããçµç¹ã¯æ å ±ã«åºã¥ããæææ±ºå®ãè¡ããããæç¶å¯èœãªæªæ¥ã«åããŠå¹æçãªè¡åããšãããšãã§ããŸãã |
ããžã¿ã«åºå
ããžã¿ã«åºåã¯ããµãŒãããŒã㣠Cookie ããããã©ã€ãã·ãŒ ãµã³ãããã¯ã¹ãªã©ã®ãã©ã€ãã·ãŒã«é æ ®ããä»£æ¿æè¡ãžãšç§»è¡ããŠããŸãããã©ã€ãã·ãŒ ãµã³ãããã¯ã¹ã¯ãã¯ãã¹ãµã€ã ãã©ããã³ã°ãšã¢ã㪠ãã©ããã³ã°ãå¶éããªãããéèŠãªåºåã®ãŠãŒã¹ã±ãŒã¹ããµããŒãããŸãããã©ã€ãã·ãŒ ãµã³ãããã¯ã¹ã¯ãTEE ã䜿çšããŠãåºåäŒç€Ÿã«ãããŠãŒã¶ãŒããŒã¿ã®å®å šãªåŠçãä¿èšŒããŸãã
TEEs ã¯ã次ã®ããžã¿ã«åºåã®ãŠãŒã¹ã±ãŒã¹ã§äœ¿çšã§ããŸãã
- ãããã³ã° ã¢ã«ãŽãªãºã : ããŒã¿ã»ããå ã®å¯Ÿå¿é¢ä¿ãé¢ä¿ãèŠã€ããŸãã
- åž°å±: 广ãã€ãã³ããèããããåå ã«çµã³ä»ããããšã
- éèš: çããŒã¿ããèŠçŽãçµ±èšæ å ±ãèšç®ããŸãã
Google Cloudã« Confidential Computing ãå®è£ ãã
Google Cloud ã«ã¯ãConfidential Computing ãå¯èœã«ããæ¬¡ã®ãµãŒãã¹ãå«ãŸããŠããŸãã
- Confidential VM: VM ã䜿çšããã¯ãŒã¯ããŒãã§äœ¿çšäžã®ããŒã¿ãæå·åã§ããŸã
- Confidential GKE: ã³ã³ããã䜿çšããã¯ãŒã¯ããŒãã§äœ¿çšäžã®ããŒã¿ãæå·åã§ããŸã
- Confidential Dataflow: ã¹ããªãŒãã³ã°åæãš ML ã§äœ¿çšäžã®ããŒã¿ãæå·åã§ããŸã
- Confidential Dataproc: ããŒã¿åŠçã§äœ¿çšäžã®ããŒã¿ãæå·åã§ããŸã
- Confidential Space: å ±åããŒã¿åæãš ML ã§äœ¿çšäžã®ããŒã¿ãæå·åã§ããŸã
ãããã®ãµãŒãã¹ã䜿çšãããšãä¿¡é Œå¢çãçž®å°ããŠãæ©å¯ããŒã¿ã«ã¢ã¯ã»ã¹ã§ãããªãœãŒã¹ãæžããããšãã§ããŸããããšãã°ãConfidential Computing ã䜿çšããªã Google Cloudç°å¢ã§ã¯ãä¿¡é Œå¢çã«ã¯Google Cloud ã€ã³ãã©ã¹ãã©ã¯ãã£ïŒããŒããŠã§ã¢ããã€ããŒãã€ã¶ããã¹ã OSïŒãšã²ã¹ã OS ãå«ãŸããŸããConfidential ComputingïŒConfidential Space ãªãïŒãå«ã Google Cloud ç°å¢ã§ã¯ãä¿¡é Œå¢çã«ã¯ã²ã¹ã OS ãšã¢ããªã±ãŒã·ã§ã³ã®ã¿ãå«ãŸããŸããConfidential Space ã䜿çšãã Google Cloudç°å¢ã§ã¯ãä¿¡é Œå¢çã¯ã¢ããªã±ãŒã·ã§ã³ãšãã®é¢é£ã¡ã¢ãªç©ºéã®ã¿ã§ããæ¬¡ã®è¡šã¯ãConfidential Computing ãš Confidential Space ã«ãã£ãŠä¿¡é Œå¢çãã©ã®ããã«çž®å°ããããã瀺ããŠããŸãã
èŠçŽ | Confidential Computing ã䜿çšããã«ä¿¡é Œå¢çå | Confidential Computing ã䜿çšããŠããå Žåã®ä¿¡é Œå¢çå | Confidential Space ã䜿çšããå Žåã®ä¿¡é Œå¢çå |
---|---|---|---|
ã¯ã©ãŠã ã¹ã¿ãã¯ãšç®¡çè |
â |
ããã |
ããã |
BIOS ãšãã¡ãŒã ãŠã§ã¢ |
â |
ããã |
ããã |
ãã¹ã OS ãšãã€ããŒãã€ã¶ |
â |
ããã |
ããã |
VM ã²ã¹ã管çè |
â |
ã¯ã |
ããã |
VM ã²ã¹ã OS |
â |
â |
ã¯ããæž¬å®ãšèšŒææžã¿ã§ã |
ã¢ããªã±ãŒã·ã§ã³ |
â |
â |
ã¯ããæž¬å®ãšèšŒææžã¿ã§ã |
æ©å¯ããŒã¿ |
â |
ã¯ã |
â |
Confidential Space ã¯ãVM å ã«å®å šãªé åãäœæããæ©å¯æ§ã®é«ãããŒã¿ãšã¢ããªã±ãŒã·ã§ã³ã«æé«ã¬ãã«ã®åé¢ãšä¿è·ãæäŸããŸããConfidential Space ã®äž»ãªã»ãã¥ãªãã£äžã®ã¡ãªããã¯æ¬¡ã®ãšããã§ãã
- å€å±€é²åŸ¡: æ¢åã® Confidential Computing ãã¯ãããžãŒã®äžã«ã»ãã¥ãªã㣠ã¬ã€ã€ã远å ããŸãã
- æ»æå¯Ÿè±¡é åã®çž®å°: ã¢ããªã±ãŒã·ã§ã³ãã²ã¹ã OS ã®æœåšçãªè匱æ§ããåé¢ããŸãã
- å¶åŸ¡ã®åŒ·å: å®å šãªç°å¢å ã®ã¢ã¯ã»ã¹ãšæš©éããã现ããå¶åŸ¡ã§ããŸãã
- ä¿¡é Œæ§ã®åäž: ããŒã¿ã®æ©å¯æ§ãšå®å šæ§ã®ä¿èšŒã匷åãããŸãã
Confidential Space ã¯ãç¹ã«èŠå¶å¯Ÿè±¡ã®æ¥çããããŒã¿ ãã©ã€ãã·ãŒãæåªå äºé ãšãªããã«ãããŒã㣠ã³ã©ãã¬ãŒã·ã§ã³ãå«ãã·ããªãªã§ãæ©å¯æ§ã®é«ãã¯ãŒã¯ããŒããåŠçããããã«èšèšãããŠããŸãã
æ©å¯åæãAIããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ã®ã¢ãŒããã¯ã㣠ãªãã¡ã¬ã³ã¹
Google Cloud ã« Confidential Computing ãå®è£ ããŠã次ã®ãŠãŒã¹ã±ãŒã¹ã«å¯Ÿå¿ã§ããŸãã
- æ©å¯åæ
- Confidential AI
- æ©å¯æ å ±ã䜿çšãããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°
以éã®ã»ã¯ã·ã§ã³ã§ã¯ãéèæ©é¢ãå»çæ©é¢ã®äŸãªã©ããããã®ãŠãŒã¹ã±ãŒã¹ã®ã¢ãŒããã¯ãã£ã«ã€ããŠè©³ãã説æããŸãã
å»çæ©é¢åãã®æ©å¯åæã¢ãŒããã¯ãã£
æ©å¯åæã¢ãŒããã¯ãã£ã¯ãè€æ°ã®å»çæ©é¢ïŒãããã€ãããã€ãªå»è¬åãç ç©¶æ©é¢ãªã©ïŒã飿ºããŠå»è¬åç ç©¶ãå éããæ¹æ³ã瀺ããŠããŸãããã®ã¢ãŒããã¯ãã£ã§ã¯ãæ©å¯ã³ã³ãã¥ãŒãã£ã³ã°æè¡ã䜿çšããŠãæ©å¯ã®ã³ã©ãã¬ãŒã·ã§ã³åæãå®è¡ããããã®ããžã¿ã« ã¯ãªãŒã³ã«ãŒã ãäœæããŸãã
ãã®ã¢ãŒããã¯ãã£ã«ã¯æ¬¡ã®ãããªå©ç¹ããããŸãã
- åææ å ±ã®åŒ·å: å ±ååæã«ãããå»çæ©é¢ã¯ããåºç¯ãªåææ å ±ãååŸããæ°è¬éçºã®åžå Žæå ¥ãŸã§ã®æéãççž®ã§ããŸãã
- ããŒã¿ ãã©ã€ãã·ãŒ: æ©å¯æ§ã®é«ãååŒããŒã¿ã¯æå·åããããŸãŸã«ãªããä»ã®åå è ã TEE ã«å ¬éãããããšã¯ãããŸãããããã«ãããæ©å¯æ§ã確ä¿ãããŸãã
- èŠå¶éµå®: ãã®ã¢ãŒããã¯ãã£ã¯ãããŒã¿ã峿 Œã«ç®¡çããããšã§ãå»çæ©é¢ãããŒã¿ä¿è·èŠå¶ãéµå®ããã®ã«åœ¹ç«ã¡ãŸãã
- ä¿¡é Œãšã³ã©ãã¬ãŒã·ã§ã³: ãã®ã¢ãŒããã¯ãã£ã«ãããç«¶åããæ©é¢éã®å®å šãªã³ã©ãã¬ãŒã·ã§ã³ãå¯èœã«ãªããæ°è¬éçºã«åããå ±åäœæ¥ãä¿é²ãããŸãã
次ã®å³ã¯ããã®ã¢ãŒããã¯ãã£ã瀺ããŠããŸãã
ãã®ã¢ãŒããã¯ãã£ã®äž»ãªã³ã³ããŒãã³ãã¯æ¬¡ã®ãšããã§ãã
- TEE OLAP éèšãµãŒããŒ: ML ã¢ãã«ã®ãã¬ãŒãã³ã°ãšæšè«ãè¡ãããå®å šãªéé¢ç°å¢ãTEE å ã®ããŒã¿ãšã³ãŒãã¯ãåºç€ãšãªããªãã¬ãŒãã£ã³ã° ã·ã¹ãã ãã¯ã©ãŠã ãããã€ãããã®äžæ£ã¢ã¯ã»ã¹ãããä¿è·ãããŸãã
- ã³ã©ãã¬ãŒã·ã§ã³ ããŒãããŒ: åå ããŠããåå»çæ©é¢ã«ã¯ãæ©é¢ã®ãã©ã€ããŒã ããŒã¿ãš TEE ã®ä»²ä»åœ¹ãšãªãããŒã«ã«ç°å¢ããããŸãã
- å»çæ©é¢åºæã®æå·åãããããŒã¿: åå»çæ©é¢ã¯ãé»åã«ã«ããªã©ã®æå·åãããæ£è ã®å人æ å ±ãä¿åããŸãããã®ããŒã¿ã¯åæããã»ã¹äžãæå·åããããŸãŸã§ãããããŒã¿ ãã©ã€ãã·ãŒã確ä¿ãããŸããããŒã¿ã¯ãåã ã®ãããã€ãããã®æ§æèšŒæã¯ã¬ãŒã ãæ€èšŒããåŸã«ã®ã¿ TEE ã«ãªãªãŒã¹ãããŸãã
- åæã¯ã©ã€ã¢ã³ã: åå ããŠããå»çæ©é¢ã¯ãããŒã¿ã«å¯ŸããŠæ©å¯æ§ã®é«ãã¯ãšãªãå®è¡ããŠãããã«åææ å ±ãååŸã§ããŸãã
éèæ©é¢åãã® Confidential AI ã¢ãŒããã¯ãã£
ãã®ã¢ãŒããã¯ã㣠ãã¿ãŒã³ã¯ãéèæ©é¢ãäžæ£è¡çºã©ãã«ã䜿çšããŠæ©å¯æ§ã®é«ãååŒããŒã¿ã®æ©å¯æ§ãä¿æããªãããäžæ£æ€åºã¢ãã«ãå ±åã§ãã¬ãŒãã³ã°ããæ¹æ³ã瀺ããŠããŸãããã®ã¢ãŒããã¯ãã£ã§ã¯ãConfidential Computing ææ³ã䜿çšããŠãå®å šãªãã«ãããŒã㣠ML ãå®çŸããŸãã
ãã®ã¢ãŒããã¯ãã£ã«ã¯æ¬¡ã®ãããªå©ç¹ããããŸãã
- äžæ£è¡çºã®æ€åºã®åŒ·å: å ±åãã¬ãŒãã³ã°ã§ã¯ãããå€§èŠæš¡ã§å€æ§ãªããŒã¿ã»ããã䜿çšãããããããæ£ç¢ºã§å¹æçãªäžæ£è¡çºæ€åºã¢ãã«ãå®çŸããŸãã
- ããŒã¿ ãã©ã€ãã·ãŒ: æ©å¯æ§ã®é«ãååŒããŒã¿ã¯æå·åããããŸãŸã«ãªããä»ã®åå è ã TEE ã«å ¬éãããããšã¯ãããŸãããããã«ãããæ©å¯æ§ã確ä¿ãããŸãã
- èŠå¶éµå®: ãã®ã¢ãŒããã¯ãã£ã¯ãéèæ©é¢ãããŒã¿ãå³å¯ã«ç®¡çããããšã§ãããŒã¿ä¿è·èŠå¶ãéµå®ããã®ã«åœ¹ç«ã¡ãŸãã
- ä¿¡é Œãšã³ã©ãã¬ãŒã·ã§ã³: ãã®ã¢ãŒããã¯ãã£ã«ãããç«¶åããæ©é¢éã®å®å šãªã³ã©ãã¬ãŒã·ã§ã³ãå¯èœã«ãªããéèè©æ¬ºã«å¯Ÿæããããã®å ±åã®åãçµã¿ãä¿é²ãããŸãã
次ã®å³ã¯ããã®ã¢ãŒããã¯ãã£ã瀺ããŠããŸãã
ãã®ã¢ãŒããã¯ãã£ã®äž»ãªã³ã³ããŒãã³ãã¯æ¬¡ã®ãšããã§ãã
- TEE OLAP éèšãµãŒããŒ: ML ã¢ãã«ã®ãã¬ãŒãã³ã°ãšæšè«ãè¡ãããå®å šãªéé¢ç°å¢ãTEE å ã®ããŒã¿ãšã³ãŒãã¯ãåºç€ãšãªããªãã¬ãŒãã£ã³ã° ã·ã¹ãã ãã¯ã©ãŠã ãããã€ãããã®äžæ£ã¢ã¯ã»ã¹ãããä¿è·ãããŸãã
- TEE ã¢ãã«ã®ãã¬ãŒãã³ã°: ã°ããŒãã«äžæ£è¡çºããŒã¹ã¢ãã«ã¯ãML ãã¬ãŒãã³ã°ãå®è¡ããã³ã³ãããšããŠããã±ãŒãžåãããŸããTEE å ã§ãåå ããŠãããã¹ãŠã®éè¡ã®æå·åãããããŒã¿ã䜿çšããŠãã°ããŒãã« ã¢ãã«ãããã«ãã¬ãŒãã³ã°ãããŸãããã¬ãŒãã³ã° ããã»ã¹ã§ã¯ããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ãå®å šãªãã«ãããŒã㣠ã³ã³ãã¥ãŒãã£ã³ã°ãªã©ã®ææ³ã䜿çšããŠãå ããŒã¿ãå ¬éãããªãããã«ããŸãã
- ã³ã©ãã¬ãŒã¿ãŒ ããŒãããŒ: åå ããåéèæ©é¢ã«ã¯ãæ©é¢ã®ãã©ã€ããŒã ããŒã¿ãš TEE ã®éã®ä»²ä»åœ¹ãšãªãããŒã«ã«ç°å¢ããããŸãã
- éè¡åºæã®æå·åãããããŒã¿: åéè¡ã¯ãäžæ£è¡çºããŒã¿ã©ãã«ãå«ããéå ¬éã®æå·åãããååŒããŒã¿ãä¿æããŸãããã®ããŒã¿ã¯ãã¹ãŠã®ããã»ã¹ã§æå·åããããŸãŸã§ãããããŒã¿ ãã©ã€ãã·ãŒã確ä¿ãããŸããããŒã¿ã¯ãåã ã®éè¡ããã®æ§æèšŒæã¯ã¬ãŒã ãæ€èšŒããåŸã«ã®ã¿ TEE ã«ãªãªãŒã¹ãããŸãã
- ã¢ãã« ãªããžããª: å ±åãã¬ãŒãã³ã°ã®åºçºç¹ãšãªãäºåãã¬ãŒãã³ã°æžã¿ã®äžæ£è¡çºæ€åºã¢ãã«ã
- ã°ããŒãã«ãªãã¬ãŒãã³ã°æžã¿äžæ£è¡çºã¢ãã«ãšãŠã§ã€ãïŒç·è²ã®ç·ã§ç€ºãããŠããŸãïŒ: æ¹è¯ãããäžæ£è¡çºæ€åºã¢ãã«ãšãã®åŠç¿æžã¿ã®ãŠã§ã€ãã¯ãå®å šã«åå éè¡ã«å ±æãããŸãããã®åŸãåéèæ©é¢ã¯ããã®åŒ·åãããã¢ãã«ãããŒã«ã«ã«ãããã€ããèªç€Ÿã®ååŒã«ãããäžæ£è¡çºæ€åºã«å©çšã§ããŸãã
éèæ©é¢åãã®æ©å¯ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ã¢ãŒããã¯ãã£
ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ã¯ã峿 ŒãªããŒã¿ ãã©ã€ãã·ãŒãšããŒã¿äž»æš©ãéèŠããã客æ§åãã®é«åºŠãªãœãªã¥ãŒã·ã§ã³ã§ããæ©å¯æ å ±ãå«ããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ã¢ãŒããã¯ãã£ã¯ãAI ã¢ããªã±ãŒã·ã§ã³ã§ããŒã¿ãå®å šãã€ã¹ã±ãŒã©ãã«ã§å¹ççã«äœ¿çšããæ¹æ³ãæäŸããŸãããã®ã¢ãŒããã¯ãã£ã§ã¯ãããŒã¿ã 1 ãæã«äžå åããã®ã§ã¯ãªããããŒã¿ãä¿åãããŠããå Žæã«ã¢ãã«ãé 眮ãããããããŒã¿æŒæŽ©ã«é¢é£ãããªã¹ã¯ã軜æžã§ããŸãã
ãã®ã¢ãŒããã¯ã㣠ãã¿ãŒã³ã¯ãè€æ°ã®éèæ©é¢ãäžæ£è¡çºã©ãã«ãå«ãæ©å¯æ§ã®é«ãååŒããŒã¿ã®æ©å¯æ§ãä¿æããªãããäžæ£è¡çºæ€åºã¢ãã«ãå ±åã§ãã¬ãŒãã³ã°ããæ¹æ³ã瀺ããŠããŸãããã®ãã©ãããã©ãŒã ã§ã¯ããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ãš Confidential Computing æè¡ã䜿çšããŠããã¬ãŒãã³ã° ããŒã¿ãç§»åãããããšãªãå®å šãªãã«ãããŒã㣠ML ãå®çŸããŸãã
ãã®ã¢ãŒããã¯ãã£ã«ã¯æ¬¡ã®ãããªå©ç¹ããããŸãã
- ããŒã¿ ãã©ã€ãã·ãŒãšã»ãã¥ãªãã£ã®åŒ·å: ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ã§ã¯ãæ©å¯ããŒã¿ãåãµã€ãã«æ®ãããã«ããããšã§ãããŒã¿ ãã©ã€ãã·ãŒãšããŒã¿ ããŒã«ãªãã£ãå®çŸããŸãããŸããéèæ©é¢ã¯ãæºååæå·åãå·®åãã©ã€ãã·ãŒ ãã£ã«ã¿ãªã©ã®ãã©ã€ãã·ãŒä¿è·æè¡ã䜿çšããŠã転éãããããŒã¿ïŒã¢ãã«ã®éã¿ãªã©ïŒãããã«ä¿è·ã§ããŸãã
- 粟床ãšå€æ§æ§ã®åäž: ããŸããŸãªã¯ã©ã€ã¢ã³ãã®ããŸããŸãªããŒã¿ãœãŒã¹ã§ãã¬ãŒãã³ã°ããããšã§ãéèæ©é¢ã¯ç°çš®ããŒã¿ã»ãããããé©åã«è¡šçŸãããå ç¢ã§æ±çšæ§ã®é«ãã°ããŒãã« ã¢ãã«ãéçºã§ããŸãã
- ã¹ã±ãŒã©ããªãã£ãšãããã¯ãŒã¯å¹ç: ãšããžã§ãã¬ãŒãã³ã°ãå®è¡ã§ãããããæ©é¢ã¯ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ãäžçäžã§ã¹ã±ãŒãªã³ã°ã§ããŸãããŸããæ©é¢ã¯ããŒã¿ã»ããå šäœã§ã¯ãªãã¢ãã«ã®éã¿ã転éããã ãã§æžãããããããã¯ãŒã¯ ãªãœãŒã¹ãå¹ççã«äœ¿çšã§ããŸãã
次ã®å³ã¯ããã®ã¢ãŒããã¯ãã£ã瀺ããŠããŸãã
ãã®ã¢ãŒããã¯ãã£ã®äž»ãªã³ã³ããŒãã³ãã¯æ¬¡ã®ãšããã§ãã
- TEE ã¯ã©ã¹ã¿å ã®é£æºãµãŒããŒ: å®å šã§éé¢ãããç°å¢å ã§ããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ãµãŒããŒããæåã«åæã¢ãã«ããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ã¯ã©ã€ã¢ã³ãã«éä¿¡ããè€æ°ã®ã¯ã©ã€ã¢ã³ãã®ååã調æŽããŸããã¯ã©ã€ã¢ã³ãã¯ããŒã«ã«ã®ããŒã¿ã»ããã§ãã¬ãŒãã³ã°ãå®è¡ããã¢ãã«ã®æŽæ°å 容ããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ãµãŒããŒã«éä¿¡ããŸãããã®ããŒã¿ãéèšãããŠã°ããŒãã«ã¢ãã«ã圢æãããŸãã
- ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ã¢ãã« ãªããžããª: ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã°ã®åºçºç¹ãšãªãäºåãã¬ãŒãã³ã°æžã¿ã®äžæ£è¡çºæ€åºã¢ãã«ã
- ããŒã«ã« ã¢ããªã±ãŒã·ã§ã³æšè«ãšã³ãžã³: ã¿ã¹ã¯ãå®è¡ããããŒã«ã« ããŒã¿ã»ããã䜿çšããŠããŒã«ã«ã§èšç®ãšåŠç¿ãè¡ããçµæãå®å šãªéèšã®ããã«ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ãµãŒããŒã«éä¿¡ããã¢ããªã±ãŒã·ã§ã³ã
- ããŒã«ã«ã®éå ¬éããŒã¿: åéè¡ã¯ãäžæ£è¡çºããŒã¿ã©ãã«ãå«ããéå ¬éã®æå·åãããååŒããŒã¿ãä¿æããŸãããã®ããŒã¿ã¯ãããã»ã¹å šäœã§æå·åããããŸãŸã§ãããããŒã¿ ãã©ã€ãã·ãŒã確ä¿ãããŸãã
- å®å šãªéçŽãããã³ã«ïŒéãç¹ç·ã§ç€ºãããŠããŸãïŒ: ãã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ãµãŒããŒã¯ãã¢ãã«ããã¬ãŒãã³ã°ããããã«åã ã®éè¡ã®æŽæ°ã«ã¢ã¯ã»ã¹ããå¿ èŠã¯ãããŸãããéè¡ãŸãã¯ãµã€ãã®ã©ã³ãã ãªãµãã»ããããååŸããæŽæ°ãã¯ãã«ã®èŠçŽ ããšã®å éå¹³åã®ã¿ãå¿ èŠã§ããå®å šãªéçŽãããã³ã«ã䜿çšããŠãããã®å éå¹³åãèšç®ããããšã§ããµãŒããŒã¯ããã®ã©ã³ãã ã«éžæããããµãã»ããå ã® 1 ã€ä»¥äžã®éè¡ãç¹å®ã®åèªãæžã蟌ãã ããšã®ã¿ãåŠç¿ããã©ã®éè¡ãæžã蟌ãã ãã¯åŠç¿ããªãããã«ããŸããããã«ããããã§ãã¬ãŒã·ã§ã³ ã©ãŒãã³ã° ããã»ã¹ã®ååå è ã®ãã©ã€ãã·ãŒãä¿è·ãããŸãã
- ã°ããŒãã«ãªäžæ£è¡çºã®ãã¬ãŒãã³ã°æžã¿ã¢ãã«ãšéèšããããŠã§ã€ãïŒç·è²ã®ç·ã§ç€ºãããŠããŸãïŒ: æ¹è¯ãããäžæ£è¡çºæ€åºã¢ãã«ãšãã®åŠç¿æžã¿ã®ãŠã§ã€ãã¯ãå®å šã«åå éè¡ã«å ±æãããŸãããã®åŸãåéèæ©é¢ã¯ããã®åŒ·åãããã¢ãã«ãããŒã«ã«ã«ãããã€ããèªç€Ÿã®ååŒã«ãããäžæ£è¡çºæ€åºã«å©çšã§ããŸãã
次ã®ã¹ããã
Confidential AI: Intel seeks to overcome AI's data protection problem ãèªãã
Confidential Computing ã®çŸåšãšæªæ¥ããèªã¿ãã ããã
Keith MoyerïŒGoogleïŒã«ããæ©å¯ã³ã³ãã¥ãŒãã£ã³ã°ã«ããå®å šãªãã«ãããŒã㣠ã³ã©ãã¬ãŒã·ã§ã³ã®å®çŸ | OC3ïŒYouTubeïŒãã芧ãã ããã
Confidential Computing ã®æ°æ©èœãã芧ãã ãããïŒYouTubeïŒ
ç°å¢ã« Confidential Computing ãš Confidential Space ãå®è£ ããã
Google Cloudã§ã® Confidential Computing ã®åºæ¬ãã芧ãã ããã
ãããã©ã€ããŒããªçæ AI ãæå¹ã«ããæ¹æ³ãã確èªãã ããã
å¯çš¿è
- Arun Santhanagopalan | ãã¯ãããžãŒ / ã€ã³ãã¥ããŒã·ã§ã³æ åœè²¬ä»»è ã Google Cloud
- Pablo Rodriguez | CTO ãªãã£ã¹ ãã¯ãã«ã« ãã£ã¬ã¯ã¿ãŒ
- Vineet Dave | ãã¯ãããžãŒ / ã€ã³ãã¥ããŒã·ã§ã³æ åœè²¬ä»»è ã Google Cloud