AIMultiple ResearchAIMultiple ResearchAIMultiple Research
We follow ethical norms & our process for objectivity.
This research is not funded by any sponsors.
Data privacy
Updated on Mar 20, 2025

Explore Top 10 Privacy Enhancing Technologies in 2025

Though data privacy legislation such as GDPR in the EU and CCPA in California are meant to prevent privacy breaches, consumer’s privacy is frequently invaded by hackers, companies and governments.

Data leakages increase as businesses share consumers’ data with third-party companies in order to increase network visibility. Privacy enhancing technologies (PETs) allow businesses to leverage the increasing amount of data while ensuring personal or sensitive information stays private. Thus, improve corporate reputation and compliance.

Privacy enhancing technologies (PETs) can be summarized under 3 major category which are tools that use cryptographic algorithms, data masking techniques and AI-privacy based methods (synthetic data generation and Featured learning in this field).
Figure 1: Landscape of PETs tools

Explore top 10 PETs and their use cases to learn how to implement PETs to enhance your businesses:

Last Updated at 01-16-2025
PETsData protectedData useBenefits
Homomorphic encryption

✓ In storage
✓ During computation
✗ On release

Secure outsourcing

- Zero info loss
- Supports operations
- No trusted third party

Secure multi-party computation

✗ In storage
✓ During computation
✗ On release

Joint analysis

- No trusted third party
- Sensitive data hidden

Differential privacy

✓ In storage (at point of data collection)
✓ During computation (with limitations)
✓ On release (with limitations)

Prevents disclosure

- Formal privacy guarantee
- Privacy quantifiable
- Limits information sharing

Trusted execution environment

✓ In storage
✓ During computation
✗ On release

Secure outsourcing

- Commercially available
- Zero info loss
- Efficient computation

Data masking

✓ In storage (through obfuscation and pseudonymization)
✗ During computation
✓ On release

Business protection

- Data obfuscation
- Pseudonymization
- Anonymization techniques

Synthetic data

✗ In storage
✓ During computation (with limitations)
✓ On release (with limitations)

Prevents disclosure

- Privacy quantifiable
- Differential privacy enabled

Federated learning

✓ In storage
✗ During computation
✗ On release

Decentralized training

- Minimal info loss
- Local computation
- Data not centralized

To leverage an automated tool, here is a list of the top data loss prevention software.

What are privacy-enhancing technologies (PETs)?

Privacy-enhancing technologies (PETs) are a broad range of technologies (hardware or software solutions) to ensure privacy and data protection while allowing organizations to extract value from data and unleash its full commercial, scientific and social potential. These technologies use various methods, including cryptography, anonymization, and obfuscation, to secure data during data processing.

By implementing PETs, organizations can help companies by

  • Maximizing data security by reducing the risk of data breaches or leaks
  • Preventing bad actors by rendering the data useless for malicious purposes
  • Facilitating safe data collaboration across departments and even organizations.

This way, PETs play a critical role in data governance and protected data utility.

Image summarizes top 10 privacy enhancing technologies (PETs) based on their categories. These are data masking techniques, ai-based privacy methods and cryptographic algorithms.
Figure 2: PETs listed based on main categories

Why are privacy-enhancing technologies (PETs) important now?

Like any other data privacy solution, privacy-enhancing technologies are important due to three reasons for businesses:

  • Regulatory compliance: Data protection laws such as GDPR, CCPA and the European Data Protection Board (EDPB) are forcing organizations to preserve consumer data. Businesses can pay serious fines because of data breaches. These fees are already being levied, according to a GDPR Data Breach Survey 2022, GDPR fines are over US$1.2 billion from January 2021 to January 2022.1 PETs can provide a reliable way to comply with these regulations, avoiding legal and financial penalties.
  • Secure data sharing: Data may need to be tested by third-party organizations due to the lack of your business’ self-sufficiency in analytics and application testing. PETs enable privacy protection while data sharing.
  • Preventing Data Breaches: Privacy breaches can harm your business’ reputation, businesses or customers (depending on your business model) may want to stop interacting with your brand. PETs help safeguard sensitive information, reducing the risk of breaches that expose personal data, such as credit card details.
    • A real-life example is the share price loss of Facebook after Cambridge Analytica scandal.2

Top 10 privacy-enhancing technology examples?

Cryptographic algorithms

1. Homomorphic encryption

Homomorphic encryption allows computations on encrypted data, producing encrypted results that match the outcome of operations on unencrypted data (i.e. plaintext). This lets companies share sensitive data with third parties for analysis while keeping it secure. The data can be analyzed and returned to the owner, who can decrypt it to view the results. It’s also valuable for storing encrypted data in cloud applications.

Some common types of homomorphic encryption are:

  • Partial homomorphic encryption:can perform one type of operation on encrypted data, such as only additions or only multiplications but not both.
  • Somewhat homomorphic encryption: can perform more than one type of operation (e.g. addition, multiplication) but enables a limited number of operations.
  • Fully homomorphic encryption: can perform more than one type of operation and there is no restriction on the number of operations performed.

2. Secure multi-party computation (SMPC)

Secure multi-party computation is a subfield of homomorphic encryption with one difference: users are able to compute values from multiple encrypted data sources. Therefore, machine learning models can be applied to encrypted data since SMPC is used for a larger volume of data.

Case study

The Boston Women’s Workforce Council (BWWC) seeks to eliminate gender and racial wage gaps in Boston through a public-private partnership, with over 250 employers pledging to address these disparities by signing the “100% Talent Compact.”

To measure the city-wide wage gap, the BWWC used secure multiparty computation (sMPC) from 2015 to 2023, analyzing salary data from one-sixth of local employees without revealing individual salaries. Employers shared payroll data with BWWC and Boston University researchers, who only accessed aggregated statistics. A user-friendly web application was developed for easy data entry by participating organizations.

Based on these applications, the BWWC found that:

  • Collaboration with usability experts is essential, as the privacy features of sMPC can complicate data entry processes and recovery from errors.
  • sMPC is a quicker and safer alternative to establishing trust relationships with sensitive data.3
The diagram shows how the BWWC applies secure multiparty computation, one of the major privacy enhancing technologies in their case.
Figure 3: Application of secure multiparty computation (sMPC) by BWWC diagram

3. Differential privacy

Differential privacy protects from sharing any information about individuals. This cryptographic algorithm adds a “statistical noise” layer to the dataset which enables to describe patterns of groups within the dataset while maintaining the privacy of individuals.

4. Zero-knowledge proofs (ZKP)

Zero-knowledge proofs uses a set of cryptographic algorithms that allow information to be validated without revealing data that proves it.

5. Trusted execution environment (TEE) 

A TEE is a secure area within a main processor that ensures the integrity and confidentiality of code and data loaded inside. The TEE operates in isolation from the rest of the system, meaning that even if the main operating system is compromised, the TEE remains secure.

The way it operates:

  • The TEE provides a protected execution environment where sensitive data and operations, such as cryptographic processes or secure authentication, can be performed without interference from the main system or potential attackers.
  • It keeps sensitive data isolated and computes operations in a secure environment, protecting against threats like malware or unauthorized access.
  • TEEs are widely used in mobile devices, IoT systems, and cloud environments for performing tasks like encryption, digital rights management (DRM), and securing payment systems.
Case study

Indonesia’s Ministry of Tourism aimed to generate accurate tourism statistics from mobile roaming data while addressing privacy concerns when sharing datasets from two mobile network operators (MNOs). The technology used was a Trusted Execution Environment (TEE), specifically Intel SGX, to securely process uniformly hashed IMSIs through the Sharemind HI platform.

As a result, the ministry:

  • Enabled accurate calculation of roaming market share.
  • Provided monthly tourism statistics based on mobile phone data.
  • Established a framework for confidential data sharing among stakeholders.
  • Remains the only known solution for analyzing cross-roaming subscriber overlap.
  • Performance is efficient even on commercial hardware.4
The diagram shows how the tourism ministry in Indonesia applied trusted execution environment systems, as a privacy enhancing technology.
Figure 4: Application of trusted execution environment by Indonesian Ministry of Tourism

Data masking techniques

Some privacy enhancing technologies are also data masking techniques that are used by businesses to protect sensitive information in their data sets.

5. Obfuscation

This one is a general term for data masking that contains multiple methods to replace sensitive information by adding distracting or misleading data to a log or profile.

6. Pseudonymization

Identifier fields (fields that contain information specific to an individual) are replaced with fictitious data such as characters or other data. Pseudonymization is frequently used by businesses to comply with GDPR.

7. Data minimisation

Collecting minimum amount of personal data that enables the business to provide the elements of a service.

8. Communication anonymizers

Anonymizers replace online identity (IP address, email address) with disposal/one-time untraceable identity.

AI-based privacy methods

9. Synthetic data generation

Synthetic data is an artificially created data by using different algorithms including ML algorithms. If you are interested in privacy-enhancing technologies because you need to transform your data into a testing environment where third-party users have access, generating synthetic data that has the same statistical characteristics is a better option.

10. Federated learning

This is a machine learning technique that trains an algorithm across multiple decentralized edge devices or servers holding local data samples, without exchanging them. With the decentralization of servers, users can also achieve data minimization by reducing the amount of data that must be retained on a centralized server or in cloud storage.

Case Study


The CARRIER project uses secondary processing of medical, lifestyle, and personal data to estimate risks and enable early detection and intervention for coronary artery disease. However, it must ensure compliance with legal standards and protect against re-identification risks when linking datasets from different organizations, adhering to national laws and the European GDPR.

To overcome this challenge, the project employed federated learning that controls the execution of approved Docker images, allowing secure data processing without direct data sharing.

As a result, the project could:

  • Develop a robust legal data governance framework to support federated learning procedures.
  • Ensured privacy and data security during the development of the prognostic model, facilitating continuous research.
  • Identified the need for ongoing governance to maintain ethical and legal compliance during project phases..5
The diagram shows how the CARRIER applies federated learning, one of the major privacy enhancing technologies in their case.
Figure 5: Application of federated learning by a healthcare project, the CARRIER

PETs market overview

The PETs market encompasses a diverse array of tools, models, and libraries designed to safeguard data privacy. For instance, each category, such as synthetic data generators or data masking tools, boasts over 20 distinct tools.

These tools are challenging to shortlist individually due to their vast diversity. To enhance clarity, we’ve grouped them, providing a comprehensive overview on the cover image above.

What are the top use cases of PETs?

Top 10 Privacy Enhancing Technologies (PETs) as Test data management, Financial transactions, Healthcare services and Facilitating data transfers.
Figure 6: Top use cases of privacy enhancing technologies
  • Test data managementApplication testing and data analysis are sometimes handled by third-party providers. Even when they are handled in-house, companies should minimize internal access to customer data. Using a suitable PET that doesn’t significantly affect test results is important for organizations.
  • Financial transactions: Financial institutions are responsible for protecting the privacy of the customers due to citizens’ freedom to conduct private deals and transactions with other parties.
  • Healthcare services: Healthcare industry collects and shares (when needed) electronic health records (EHR) of patients. For example, clinical data can be used for searching for adverse effects of various drug combinations. Healthcare companies ensure the privacy of patients’ data in such cases by using PETs.
  • Facilitating data transfer between multiple parties including intermediaries: For businesses that work as a middle man between two parties, the usage of PETs is crucial since these businesses are responsible for protecting the privacy of both parties’ information.
The image asks questions to identify what kind of privacy enhancing technologies they can use use. For instance if the user needs to link back to customers, then they need to check if there is any universal legal basis for data processing, if yes then they must check for secure analysis and based on that they can decide either encrypted analysis and anonymised computing or they prefer other types of encryption and data access management.
Figure 7: Guiding steps to decide which privacy enhancing technology to choose.

FAQ

Choosing the right privacy-enhancing tool for your business

Navigating the array of privacy-enhancing tools (PETs) in the market requires a strategic approach tailored to your unique business needs. To ensure optimal integration and alignment with your software stack and IT infrastructure, consider the following steps:
1. Identify your needs and goals
You must identify issues you aim to solve by deploying a PET. To do this you may:
a.) Assess your data landscape: Identify the volume and nature of the data your business manages. Determine if it is predominantly structured or unstructured, as this influences the choice of PETs that best suit your requirements.
b.) Map third-party data sharing: Understand the intricacies of third-party data sharing. If your data traverses external channels, prioritize solutions like homomorphic encryption to maintain security and confidentiality during transit.
c.) Define data access needs:
Clearly distinguish the level of access required to the dataset—assessing whether full access is essential or if accessing only the result/output suffices. Additionally, consider the ability to obfuscate personally identifiable information for enhanced privacy.
d.)Determine data utilization: Check you aim to use data for statistical analysis, market insights, machine learning model training, or similar purposes.
2. Evaluate different types of PETs:
Consider the three main categories of PETs—cryptographic tools, data masking techniques, and AI-based solutions like synthetic data generators. Identify which type aligns best with your privacy objectives and data protection needs.
3. Shortlist tools based on categories:
Once you’ve identified the PET categories relevant to your needs, shortlist specific tools within each category. Consider aspects such as functionality, scalability, and compatibility with your existing infrastructure.
4. Evaluate IT infrastructure:
Conduct a thorough evaluation of your IT infrastructure, taking into account network and computational capabilities. This assessment will guide you in selecting PETs that seamlessly integrate with your enterprise resources. Identify areas that may require upgrades for compatibility.
5. Consider budgetary allocations:
Be proactive in budget planning, recognizing that PETs can vary in cost. Allocate resources based on your specific privacy requirements and financial capacity. Consider factors such as scalability, maintenance, and potential additional costs associated with the chosen PET solution.

Don’t forget to check our article on data security best practices. If you still have questions about privacy-enhancing technologies, we would like to help:

Find the Right Vendors

External sources

Share This Article
MailLinkedinX
Cem has been the principal analyst at AIMultiple since 2017. AIMultiple informs hundreds of thousands of businesses (as per similarWeb) including 55% of Fortune 500 every month.

Cem's work has been cited by leading global publications including Business Insider, Forbes, Washington Post, global firms like Deloitte, HPE and NGOs like World Economic Forum and supranational organizations like European Commission. You can see more reputable companies and resources that referenced AIMultiple.

Throughout his career, Cem served as a tech consultant, tech buyer and tech entrepreneur. He advised enterprises on their technology decisions at McKinsey & Company and Altman Solon for more than a decade. He also published a McKinsey report on digitalization.

He led technology strategy and procurement of a telco while reporting to the CEO. He has also led commercial growth of deep tech company Hypatos that reached a 7 digit annual recurring revenue and a 9 digit valuation from 0 within 2 years. Cem's work in Hypatos was covered by leading technology publications like TechCrunch and Business Insider.

Cem regularly speaks at international technology conferences. He graduated from Bogazici University as a computer engineer and holds an MBA from Columbia Business School.

Next to Read

Comments

Your email address will not be published. All fields are required.

0 Comments