Table of Contents: Secure Analytics and Machine Learning in Cloud ......................................................................................... 2 Use case #1 in Financial Industry .............................................................................................................. 2 Data Flow .............................................................................................................................................. 2 The approach can be used for other Use-cases .................................................................................... 2 Homomorphic Encryption for Secure Machine Learning in Cloud ............................................................... 3 Evolving Homomorphic Encryption .......................................................................................................... 3 Performance Examples – HE, RSA and AES ........................................................................................... 3 Performance Examples – FHE, NTRU, ECC, RSA and AES ...................................................................... 3 Some popular HE schemes .................................................................................................................... 4 Examples of HE Libraries used by IBM, Duality, and Microsoft ............................................................ 4 Fast Homomorphic Encryption for Secure Analytics in Cloud ...................................................................... 4 Use case #2 in Health Care ........................................................................................................................ 5 Provable security for untrusted environments ..................................................................................... 5 Comparison to multiparty computation and trusted execution environments ................................... 5 Time and memory requirements of HE ................................................................................................ 5 Managing Data Security in Hybrid Cloud ...................................................................................................... 8 Data Security Policy and Zero Trust Architecture ..................................................................................... 8 The future of encryption will change in the Post-Quantum Era: .............................................................. 8 Managing Data Security in a Hybrid World ................................................................................................... 9 Evolving Privacy Regulations ....................................................................................................................... 10 New Ruling in GDPR under "Schrems II" ................................................................................................. 10 The new California Privacy Rights Act (CPRA)