{"id":69140,"date":"2021-07-17T02:51:55","date_gmt":"2021-07-17T02:51:55","guid":{"rendered":"https:\/\/websitedesigns.com.au\/elankanew\/?p=69140"},"modified":"2021-07-17T02:53:59","modified_gmt":"2021-07-17T02:53:59","slug":"ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe","status":"publish","type":"post","link":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/","title":{"rendered":"Ensuring protection in data sharing: Privacy Enhancing Computation  By Aditya Abeysinghe"},"content":{"rendered":"<h1 style=\"text-align: center;\"><span style=\"color: #333300;\"><strong>Ensuring protection in data sharing: Privacy Enhancing Computation<\/strong><\/span><\/h1>\n<h1 style=\"text-align: center;\"><span style=\"color: #003300;\"><strong>By Aditya Abeysinghe<\/strong><\/span><\/h1>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\"><strong>\u00a0<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\" wp-image-62338 alignleft\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/04\/Aditya-Abeysinghe1.jpg\" alt=\"\" width=\"259\" height=\"228\" \/>Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to concern about their privacy when communicating over third party applications. While many applications today ensure encryption, masking and other techniques to hide the original form during transmission between two users many say that these techniques are easily decodable by eavesdropping middle parties during transmission. Therefore, research has focused on a new avenue to solve this issue by enforcing technologies that ensure privacy of data. These collections of technologies used for ensuring consumer privacy is called Privacy Enhancing Computation (PEC).<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #003300;\"><strong>How does PEC ensure privacy?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">Data used at present is mainly of two categories: data in use and data at rest. To understand what these two mean, let us take an example of a user utilizing a social media app and is texting some messages to a friend. Data that is texted at the time of texting is data \u201cin use\u201d. If the same user has sent messages previously to his friend, then those data is stored somewhere in data servers for later use. That data which is stored is data \u201cat rest\u201d. PEC concerns about data in use. In other words, data that is transmitted between two or more users.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">Consider the same example where two users send messages. Data is encrypted at the user who is the sender of messages and then decrypted at the other user who is the receiver of messages. Both encryption and decryption is done by the social media app they are using, i.e. the middle party with which they are interacting. The main issue in privacy in communications lies in this middle party; can this middle party be trusted? To solve this issue PEC requires a trusted third party where communications are secured and transmitted.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">Many business applications today use real-time processing of data using various Artificial Intelligence (AI) and Machine Learning (ML) algorithms. This form of analytics use data in use as opposed to analytics on data that is stored. To ensure privacy in such type of analytics, PEC recommends use of privacy-aware ML techniques.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">PEC also concerns about computation that transforms data before processing. Several technologies are used for this purpose: differential privacy, secure multiparty computation, homomorphic encryption and trusted execution environments. Of these technologies, homomorphic encryption is considered the most secure, whereas trusted execution environments is considered the least secure technique.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #003300;\"><strong>Does PEC solve privacy issues?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\"><img loading=\"lazy\" loading=\"lazy\" decoding=\"async\" class=\" wp-image-69141 alignleft\" src=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg\" alt=\"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe\" width=\"248\" height=\"139\" \/>PEC actually became a real-world solution recently. Hence, the number of applications that are actually using PEC is limited. While research has shown that privacy is secured with advanced cryptographic techniques used in PEC, it has been seldom tested in many general use and specific use applications at present.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\">For many businesses, PEC is too complex to be implemented as it requires heavy computation on the business side and large investments need to be made to meet these demands. The returns for a business by implementing a PEC solution is debatable as it can cater only a specific set of users with such technologies.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-size: 20px; color: #000000;\"><strong>Image Courtesy: <span style=\"color: #003300;\"><a style=\"color: #003300;\" href=\"https:\/\/www.techradar.com\" target=\"_blank\" rel=\"noopener\">https:\/\/www.techradar.com<\/a> <\/span><\/strong><\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe \u00a0 Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":69141,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[33978,20],"tags":[33977,30135,35809,35917,35916],"class_list":{"0":"post-69140","1":"post","2":"type-post","3":"status-publish","4":"format-aside","5":"has-post-thumbnail","7":"category-aditya-abeysinghe","8":"category-articles","9":"tag-aditya-abeysinghe","10":"tag-artificial-intelligence","11":"tag-machine-learning","12":"tag-pec-solution","13":"tag-privacy-enhancing-computation","14":"post_format-post-format-aside"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe - eLanka<\/title>\n<meta name=\"description\" content=\"Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe\" \/>\n<meta property=\"og:description\" content=\"Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/\" \/>\n<meta property=\"og:site_name\" content=\"eLanka\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/eLanka.com.au\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-17T02:51:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-17T02:53:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"168\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"eLanka admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eLanka admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/\"},\"author\":{\"name\":\"eLanka admin\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\"},\"headline\":\"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe\",\"datePublished\":\"2021-07-17T02:51:55+00:00\",\"dateModified\":\"2021-07-17T02:53:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/\"},\"wordCount\":566,\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg\",\"keywords\":[\"Aditya Abeysinghe\",\"Artificial intelligence\",\"Machine Learning\",\"PEC solution\",\"Privacy Enhancing Computation\"],\"articleSection\":[\"Aditya Abeysinghe\",\"Articles\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/\",\"name\":\"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe - eLanka\",\"isPartOf\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg\",\"datePublished\":\"2021-07-17T02:51:55+00:00\",\"dateModified\":\"2021-07-17T02:53:59+00:00\",\"description\":\"Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to\",\"breadcrumb\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg\",\"width\":300,\"height\":168,\"caption\":\"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Articles\",\"item\":\"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#website\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"name\":\"eLanka\",\"description\":\"eLanka - Sri lanka events in Australia\",\"publisher\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#organization\",\"name\":\"eLanka\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"contentUrl\":\"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg\",\"width\":192,\"height\":82,\"caption\":\"eLanka\"},\"image\":{\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/eLanka.com.au\/\",\"https:\/\/www.linkedin.com\/in\/elanka\/\",\"https:\/\/www.youtube.com\/user\/SriLankanDownUnder\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd\",\"name\":\"eLanka admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g\",\"caption\":\"eLanka admin\"},\"sameAs\":[\"https:\/\/websitedesigns.com.au\/elankanew\"],\"url\":\"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe - eLanka","description":"Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe","og_description":"Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to","og_url":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/","og_site_name":"eLanka","article_publisher":"https:\/\/www.facebook.com\/eLanka.com.au\/","article_published_time":"2021-07-17T02:51:55+00:00","article_modified_time":"2021-07-17T02:53:59+00:00","og_image":[{"width":300,"height":168,"url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg","type":"image\/jpeg"}],"author":"eLanka admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eLanka admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#article","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/"},"author":{"name":"eLanka admin","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd"},"headline":"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe","datePublished":"2021-07-17T02:51:55+00:00","dateModified":"2021-07-17T02:53:59+00:00","mainEntityOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/"},"wordCount":566,"publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg","keywords":["Aditya Abeysinghe","Artificial intelligence","Machine Learning","PEC solution","Privacy Enhancing Computation"],"articleSection":["Aditya Abeysinghe","Articles"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/","name":"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe - eLanka","isPartOf":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website"},"primaryImageOfPage":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage"},"thumbnailUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg","datePublished":"2021-07-17T02:51:55+00:00","dateModified":"2021-07-17T02:53:59+00:00","description":"Data privacy has become a much debated issue with a plethora of personal and business communication applications, websites and mobile apps available today. Who intercepts data, who has authority over data and what is done to these stored data without user consent has caused users to","breadcrumb":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#primaryimage","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2021\/07\/Ensuring-protection-in-data-sharing-Privacy-Enhancing-.jpg","width":300,"height":168,"caption":"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe"},{"@type":"BreadcrumbList","@id":"https:\/\/websitedesigns.com.au\/elankanew\/ensuring-protection-in-data-sharing-privacy-enhancing-computation-by-aditya-abeysinghe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/websitedesigns.com.au\/elankanew\/"},{"@type":"ListItem","position":2,"name":"Articles","item":"https:\/\/websitedesigns.com.au\/elankanew\/category\/articles\/"},{"@type":"ListItem","position":3,"name":"Ensuring protection in data sharing: Privacy Enhancing Computation By Aditya Abeysinghe"}]},{"@type":"WebSite","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#website","url":"https:\/\/websitedesigns.com.au\/elankanew\/","name":"eLanka","description":"eLanka - Sri lanka events in Australia","publisher":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/websitedesigns.com.au\/elankanew\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#organization","name":"eLanka","url":"https:\/\/websitedesigns.com.au\/elankanew\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/","url":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","contentUrl":"https:\/\/websitedesigns.com.au\/elankanew\/wp-content\/uploads\/2020\/03\/elanka-logo.jpg","width":192,"height":82,"caption":"eLanka"},"image":{"@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/eLanka.com.au\/","https:\/\/www.linkedin.com\/in\/elanka\/","https:\/\/www.youtube.com\/user\/SriLankanDownUnder"]},{"@type":"Person","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/f6e635b74ab35ef88a68a9973cacc5bd","name":"eLanka admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/websitedesigns.com.au\/elankanew\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e0d346a7f97b80e861cdeafe7b7de523b59f5060666f1a5da8369457bf9b6c3?s=96&d=mm&r=g","caption":"eLanka admin"},"sameAs":["https:\/\/websitedesigns.com.au\/elankanew"],"url":"https:\/\/websitedesigns.com.au\/elankanew\/author\/elanka\/"}]}},"_links":{"self":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/69140","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/comments?post=69140"}],"version-history":[{"count":3,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/69140\/revisions"}],"predecessor-version":[{"id":69145,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/posts\/69140\/revisions\/69145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media\/69141"}],"wp:attachment":[{"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/media?parent=69140"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/categories?post=69140"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/websitedesigns.com.au\/elankanew\/wp-json\/wp\/v2\/tags?post=69140"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}