Leading the way in innovation for over 55 years, we build greater futures for businesses across multiple industries and 55 countries.
Our expert, committed team put our shared beliefs into action – every day. Together, we combine innovation and collective knowledge to create the extraordinary.
We share news, insights, analysis and research – tailored to your unique interests – to help you deepen your knowledge and impact.
At TCS, we believe exceptional work begins with hiring, celebrating and nurturing the best people — from all walks of life.
Get access to a catalog of the latest news stories from across TCS. Discover our press releases, reports, and company announcements.
Harika Narumanchi
Researcher, Cybersecurity and Privacy Research Area, TCS R&I.
Nitesh Emmadi
Researcher, CyberSecurity and Privacy Research Group, TCS Innovation Labs, India
Dr Praveen Gauravaram
Senior Scientist, Tata Consultancy Services (TCS)
You have these already downloaded
We have sent you a copy of the report to your email again.
Over the years, data privacy rules in several geographies have evolved and several countries are strictly mandating organizations to ensure data privacy regulation and enhance transparency on storage and processing of customers’ data. Non-compliance to these regulations is causing huge financial and credibility implications to organizations. Currently, 10% of data is covered under privacy regulations – this is expected to be 65% by 2023. Also, with organizations increasingly relying on cloud service providers (CSPs), the major challenge for CSPs is to protect privacy and confidentiality of the data while still being able to cater to users’ needs.
Fully homomorphic encryption (FHE), an evolving approach with mathematically provable security guarantees, enables computations on the encrypted data; thus, offering protection to the privacy of data. As privacy regulations are critical for both organizations as well as CSPs, FHE enables both of them to reduce their liabilities. While FHE solves the problem with adequate security guarantees, it incurs some cost in terms of computational complexity and memory requirement. As remarked in our previous white paper on this subject, FHE based computation is a million times slower than normal computation on plaintext. We now intuitively describe several fundamental aspects that hinder performance and how the computing model in FHE differs from the normal scenario. This can help explain the limitations in a simpler manner, which in turn can help users envision new applications in FHE domain.
Leveraging AI-powered model for crypto money laundering detection
Ecosystem Modeling in a Digitally Simulated Electricity Market
Empowering Forest Landowners to Measure and Monetize Carbon Credits
A Journey from Software Development to Visual Intelligence Research