Data in Use Definition & Meaning
Data in use is data that's active, even if it's being stored at the time (such as an application on a computer that may not be used every second, but the data is still active in storage). Although both may be stored, data in use differs from data at rest in that data in use may be stored for periods of time while working in storage, such as a computer's memory. Data at rest, on the other hand, is permanently or temporarily stored in a fixed location, often secured by full disk encryption or other methods that keep a storage disk, drive, or vault safe. Because it is regularly accessed or used, data in use is much trickier to secure.
Data in use is more susceptible to unauthorized access because it's often accessed by multiple users (such as a work document or important file). While memory on a computer can be encrypted, if that data is active, current-use files are harder to secure. Rather than focusing entirely on encrypting the data, authenticating the users who have access to that data becomes a primary concern. However, there are a few encryption methods for data in use that help stem the tide of unauthorized access and sensitive data breaches.
Methods of protecting data in use
Confidential computing is one popular method of protecting data in use. It utilizes a Trusted Execution Environment, often hosted on hardware, that shields the data from users or programs that have access to the hardware but aren't authorized to see the data. The Trusted Execution Environment (TEE) can be specifically designed with data protection features; its programmable nature allows it to more securely protect data.
Homomorphic encryption is a relatively new method of encrypting data in use that has not been commonly adopted. However, it's promising because it keeps data encrypted while that data is being used or processed. Then it doesn't have to be decrypted and encrypted multiple times as it's used, which increases the risk of interception during the decryption process. When the data is finally decrypted in a secure environment, it has undergone the appropriate changes without being damaged or misused.
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ we list 1,559 text message and online chat abbreviations to help you translate and understand today's texting lingo. Includes Top... Read More »Huge List of Computer Certifications
Have you heard about a computer certification program but can't figure out if it's right for you? Use this handy list to help you decide. Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »