ChatGPT - Solving AI’s Privacy Issue

There is no doubt that AI, and in particular Large Language Models (LLMs) such as ChatGPT will have a tremendous impact on society, perhaps even more than the Internet did before. From education to healthcare, movies to music, art to finance, not a single industry isn’t being disrupted by AI.

While foundational models that are trained on generic, publicly accessible data are powerful, they really become useful when contextualised for a given task or user, either through fine-tuning on private data, or pre-prompting with contextual information before sending in a query.

In both cases however there is a major privacy issue: all this private data goes to the company operating the service!

This is why several countries and companies, such as Italy and Samsung, are now limiting the use of ChatGPT and alike. Without strong privacy guarantees, the risk of data breach and manipulation is simply too high. 
Can cryptography solve the privacy problem?

Fortunately, there is a way to both use AI and keep our data private: Fully Homomorphic Encryption (FHE) is a new encryption technique that enables computing on encrypted data, without actually decrypting it. And it may be a way to bridge the gap between the effective use of AI and keeping our data private.

When applied to AI, it works in the following way:

  1.  The user encrypts their data and query using a secret key that they only know
  2.  The encrypted data is then sent to the server running the AI model, which then processes it encrypted, producing a result which itself is encrypted. At no point does the server see the data, everything is done blindly!
  3.  The user then decrypts the response from the AI, revealing its content. 

What this means is that for users, nothing changes: they send queries and get an answer, but since the data is encrypted both in transit and during processing, nobody can see it: neither the company offering the service, nor governments or hackers. It’s end-to-end encryption for AI!

Of course, privacy is just a drop in a broader ocean of LLM-associated challenges that also involve discussions around copyright and unconscious bias, and FHE will therefore not offer a silver bullet to all the practical issues currently being discussed. However, it has the potential to evolve into a key piece of the current puzzle.

Why Aren’t We Using This Already?

The reason why FHE isn’t being used in widespread applications today, is because up until recently, it was too slow, too complicated and too limited to be useful. It took a PhD in cryptography to do a simple encrypted multiplication, and that would take minutes to complete. But thanks to recent development breakthroughs from a number of  companies and academic institutions, as well as hardware acceleration efforts from companies such as Intel and Cornami, homomorphic encryption is quickly becoming a reality. 

On the usability side, developers no longer need to know cryptography to use FHE. They can simply use homomorphic compilers to write Python code and have it automatically converted to an encrypted equivalent. On the feature side, we are also no longer limited to a handful of encrypted additions and multiplications. Anything is now doable in FHE, from deep neural networks to blockchain smart contracts to genomics. The only thing missing is performance.

Using traditional CPUs and GPUs to run ChatGPT encrypted end-to-end would cost tens of thousands of dollars per query, vs a few cents if the data isn’t encrypted. This means we need at least 100,000x better performance if we want FHE to be cost effective enough that it becomes the norm.

Thankfully, we have a solution: hardware acceleration. By creating dedicated chips for homomorphic encryption, we can make it anywhere from 1,000x to 10,000x faster, while simultaneously being 5-10x cheaper than conventional chips. Together, this means the 100,000x cost improvement we are looking for is within reach, and likely to happen in the next 5 years as these accelerators become available commercially.

While privacy isn’t the only issue with AI, it is a major hurdle for global adoption. Without it, we would need to trust a handful of companies with our most private information, or not use AI at all.

This is why homomorphic encryption is such a big deal: it solves the AI privacy dilemma, by allowing us to both use AI and keep our data private! Because in the end, if AIs don’t know anything about us, perhaps they won’t be able to harm us as much.

Dr Rand Hindi is CEO of  Zama

Image: Shubham Dhage

You Might Also Read:

Guidelines For AI Systems Development:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Too Many Corporate Employees Ignore Cyber Security
OxCyber - Not for Profit Cyber Security Community »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

mile2

mile2

Mile2 develop and deliver proprietary vendor neutral professional certifications for the cyber security industry.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Security Industry Association (SIA)

Security Industry Association (SIA)

The SIA's mission is to be a catalyst for success​ within the global security industry through information, insight and influence.

CISPA Helmholtz Center for Information Security

CISPA Helmholtz Center for Information Security

The CISPA Helmholtz Center for Information Security is a German national Big Science Institution within the Helmholtz Association. Our research encompasses all aspects of Information Security.

BigID

BigID

BigID is redefining personal data protection and privacy. BigID software helps companies secure their customer data & satisfy privacy regulations like GDPR.

Independent Security Evaluators (ISE)

Independent Security Evaluators (ISE)

ISE is an independent security consulting firm headquartered in Baltimore, Maryland dedicated to securing high value assets for global enterprises and performing groundbreaking security research.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

ECS Ethiopia

ECS Ethiopia

ECS Ethiopia provides Ethiopia’s leading institutions with top cyber-security expertise and technology to enable them to overcome risks and market barriers enabling them to grow their business.

Commvault

Commvault

Commvault's data protection and information management solutions help companies protect, access and use all of their data, anywhere and anytime.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

IndoSec

IndoSec

IndoSec is an annual cybersecurity summit that powers an in-person gathering of cybersecurity leaders from Indonesia’s major corporations, leading businesses and key government entities.

Cyber Guru

Cyber Guru

Cyber Guru is an effective cybersecurity awareness training platform, enabling organisations to increase their resistance to cyber-attacks by changing employee behaviour.

True Corporation

True Corporation

True Corporation is Thailand’s leading Telecom-Tech company, empowering people and businesses with connected solutions that advance society sustainably.