{"id":1336,"date":"2026-03-03T12:00:33","date_gmt":"2026-03-03T11:00:33","guid":{"rendered":"https:\/\/tuneinsight.com\/en\/?p=1336"},"modified":"2026-03-10T08:45:53","modified_gmt":"2026-03-10T07:45:53","slug":"technologies-for-data-collaboration","status":"publish","type":"post","link":"https:\/\/tuneinsight.com\/en\/news\/technologies-for-data-collaboration\/","title":{"rendered":"Technology with purpose: Tune Insight\u2019s co-founder &amp; CTO reveals the vision behind the company\u2019s technological choices"},"content":{"rendered":"<h2><b>Three technologies, one vision: using health data without compromising on privacy<\/b><\/h2>\n<h3>A new approach to health data<\/h3>\n<p>As health systems go digital, institutions are producing vast amounts of data \u2013 data that is both extremely sensitive, requiring the highest levels of protection, and highly valuable for advancing research, accelerating therapeutic innovation and optimizing hospital organization. Progress in the sector has been stalled for years as data either remains locked away in silos, or is centralized using environments that raise issues of sovereignty, trust and conformity.<\/p>\n<p>\u201c<em>The only way to collaborate across jurisdictions is to federate,<\/em>\u201d emphasizes Romain Bouy\u00e9, Tune Insight\u2019s CTO. This belief is not merely a technical principle, it\u2019s at the very heart of Tune Insight\u2019s approach: combining three technologies, rather than relying on any one alone, to maintain maximum data security while leveraging its full potential.<\/p>\n<p>But what does this actually look like on a practical level? Romain Bouy\u00e9 shares how Tune Insight has had to make bold technological choices \u2013 sometimes going against industry trends \u2013 to overcome a simple problem with game-changing potential: allowing healthcare actors to share sensitive data <strong>without ever compromising on privacy, sovereignty or analytical quality<\/strong>.<\/p>\n<p>Combining the three building blocks of differential privacy, homomorphic encryption and federated architecture is the revolution health data sharing needs.<\/p>\n<h2><b>1. Differential privacy: protecting the person without destroying the information<\/b><\/h2>\n<p>At first glance, differential privacy looks like a simple data anonymization operation. But it\u2019s much more subtle than that. In reality, the more variables we add, the greater the risk of a patient being re-identified \u2013 even with aggregated data.<\/p>\n<p>\u201c<em>Anonymous statistics are possible without differential privacy if there are many patients and little information&#8230; But as soon as you add variables, aggregation alone just isn\u2019t enough,<\/em>\u201d Romain Bouy\u00e9 explains.<\/p>\n<p>Differential privacy provides an extra layer of protection by adding controlled statistical noise after aggregation to prevent unnecessary data degradation. This solution simultaneously preserves the analytical value of the data and individual privacy.<br \/>\nAnother challenge lies in applying the restrictions needed to comply with the data contributor privacy policies. This may mean guaranteeing sufficiently secure aggregation or limiting the number of requests.<\/p>\n<p>\u201c<em>Implementing these restrictions is particularly complex, not just technically but also in terms of user experience. The rules must be clearly expressed\u2014a crucial and non-trivial work.<\/em>\u201d<\/p>\n<p>This first building block provides a <strong>mathematical guarantee<\/strong>: no individual information can be extracted, not even indirectly.<\/p>\n<h2>2. Homomorphic encryption: performing calculations without ever seeing the data<\/h2>\n<aside class=\"calloutBox\" data-pm-slice=\"2 2 [&quot;document&quot;,{&quot;aiOptions&quot;:{&quot;preserveLayouts&quot;:false,&quot;imageOptions&quot;:{&quot;license&quot;:&quot;All&quot;,&quot;provider&quot;:&quot;auto&quot;,&quot;model&quot;:&quot;ideogram-v3-turbo&quot;,&quot;modelAutoselect&quot;:true,&quot;stylePreset&quot;:&quot;Theme&quot;,&quot;visualsMenuEnabled&quot;:true,&quot;artStylePreset&quot;:&quot;photorealistic&quot;,&quot;artStylePrompt&quot;:&quot;photorealistic. highly detailed, cinematic, professional&quot;}},&quot;docId&quot;:&quot;1mhmisua2yw6oid&quot;,&quot;background&quot;:{&quot;type&quot;:&quot;none&quot;},&quot;docFlags&quot;:{&quot;cardLayoutsEnabled&quot;:true},&quot;format&quot;:&quot;document&quot;,&quot;customCode&quot;:{},&quot;settings&quot;:{&quot;defaultFullBleed&quot;:&quot;contained&quot;,&quot;stylesDerivedFrom&quot;:&quot;document_default&quot;,&quot;cardDimensions&quot;:&quot;fluid&quot;,&quot;verticalAlign&quot;:&quot;center&quot;,&quot;defaultContentWidth&quot;:&quot;md&quot;,&quot;fontSize&quot;:&quot;md&quot;,&quot;scaleContentToFit&quot;:false,&quot;locale&quot;:&quot;en&quot;,&quot;animationsEnabled&quot;:true},&quot;generateStatus&quot;:&quot;done&quot;,&quot;generateInfo&quot;:{&quot;interactionId&quot;:&quot;16cad5o5gwvbx7h&quot;,&quot;streamId&quot;:&quot;1mhmisua2yw6oid&quot;,&quot;lastEventId&quot;:&quot;1&quot;,&quot;lastCompletedCardId&quot;:&quot;6rji3qldkd9eo0m&quot;,&quot;lastCompletedCardIndex&quot;:0}},&quot;card&quot;,{&quot;id&quot;:&quot;6rji3qldkd9eo0m&quot;,&quot;previewContent&quot;:null,&quot;background&quot;:{&quot;type&quot;:&quot;none&quot;},&quot;container&quot;:{},&quot;cardSize&quot;:&quot;full&quot;,&quot;layout&quot;:&quot;blank&quot;,&quot;layoutTemplateColumns&quot;:null,&quot;layoutTemplateRows&quot;:null,&quot;verticalAlign&quot;:null,&quot;generatorInput&quot;:null,&quot;fontScale&quot;:null,&quot;cardMarginSettings&quot;:{},&quot;hidden&quot;:false},&quot;cardLayoutItem&quot;,{&quot;itemId&quot;:&quot;body&quot;}]\">Although differential privacy protects individuals, it does not allow several actors to collaborate without mutual trust. This is where the second building block, homomorphic encryption, comes in. Long considered purely theoretical, it has only become a usable technique in the past decade.The principle behind it is revolutionary: data is encrypted before transmission and remains encrypted throughout the calculation. No third parties, not even Tune Insight, can access it.<\/p>\n<p>Romain Bouy\u00e9 sums up the technique with a simple analogy: \u201c<em>If I provide X and Y in an encrypted form, the calculation \u2018X + Y\u2019 is done without ever knowing that X is 2 and Y is 3. And only the recipient can decrypt the result.<\/em>\u201d<br \/>\nHomomorphic encryption complements differential privacy by enabling data from different actors to be aggregated.<\/p>\n<p>And the different roles involved are kept completely separate:<\/p>\n<ul>\n<li>Institutions provide data,<\/li>\n<li>Another entity performs the calculations,<\/li>\n<li>Only the final recipient can read the results.<\/li>\n<\/ul>\n<p>Tune Insight is the facilitator behind the process but never has access to the data itself. This is a complete reversal of the usual approach, where the technical operator is often also the host, the processor and the infrastructure owner.<\/p>\n<\/aside>\n<aside class=\"calloutBox\" data-pm-slice=\"2 2 [&quot;document&quot;,{&quot;aiOptions&quot;:{&quot;preserveLayouts&quot;:false,&quot;imageOptions&quot;:{&quot;license&quot;:&quot;All&quot;,&quot;provider&quot;:&quot;auto&quot;,&quot;model&quot;:&quot;ideogram-v3-turbo&quot;,&quot;modelAutoselect&quot;:true,&quot;stylePreset&quot;:&quot;Theme&quot;,&quot;visualsMenuEnabled&quot;:true,&quot;artStylePreset&quot;:&quot;photorealistic&quot;,&quot;artStylePrompt&quot;:&quot;photorealistic. highly detailed, cinematic, professional&quot;}},&quot;docId&quot;:&quot;1mhmisua2yw6oid&quot;,&quot;background&quot;:{&quot;type&quot;:&quot;none&quot;},&quot;docFlags&quot;:{&quot;cardLayoutsEnabled&quot;:true},&quot;format&quot;:&quot;document&quot;,&quot;customCode&quot;:{},&quot;settings&quot;:{&quot;defaultFullBleed&quot;:&quot;contained&quot;,&quot;stylesDerivedFrom&quot;:&quot;document_default&quot;,&quot;cardDimensions&quot;:&quot;fluid&quot;,&quot;verticalAlign&quot;:&quot;center&quot;,&quot;defaultContentWidth&quot;:&quot;md&quot;,&quot;fontSize&quot;:&quot;md&quot;,&quot;scaleContentToFit&quot;:false,&quot;locale&quot;:&quot;en&quot;,&quot;animationsEnabled&quot;:true},&quot;generateStatus&quot;:&quot;done&quot;,&quot;generateInfo&quot;:{&quot;interactionId&quot;:&quot;16cad5o5gwvbx7h&quot;,&quot;streamId&quot;:&quot;1mhmisua2yw6oid&quot;,&quot;lastEventId&quot;:&quot;1&quot;,&quot;lastCompletedCardId&quot;:&quot;6rji3qldkd9eo0m&quot;,&quot;lastCompletedCardIndex&quot;:0}},&quot;card&quot;,{&quot;id&quot;:&quot;6rji3qldkd9eo0m&quot;,&quot;previewContent&quot;:null,&quot;background&quot;:{&quot;type&quot;:&quot;none&quot;},&quot;container&quot;:{},&quot;cardSize&quot;:&quot;full&quot;,&quot;layout&quot;:&quot;blank&quot;,&quot;layoutTemplateColumns&quot;:null,&quot;layoutTemplateRows&quot;:null,&quot;verticalAlign&quot;:null,&quot;generatorInput&quot;:null,&quot;fontScale&quot;:null,&quot;cardMarginSettings&quot;:{},&quot;hidden&quot;:false},&quot;cardLayoutItem&quot;,{&quot;itemId&quot;:&quot;body&quot;}]\">\n<h2><b>3. Federation: moving compute, never data<\/b><\/h2>\n<p>The rationale behind the third technology used by Tune Insight, federated architecture, is simple: health data can never circulate freely. Not between countries, and in some cases, not even between institutions.<\/p>\n<p>\u201c<em>Health data is invaluable. It needs to stay where it is<\/em>,\u201d insists Romain Bouy\u00e9.<\/p>\n<p>This philosophy came from an initial requirement expressed by the Geneva University Hospitals, which categorically refused to allow their data to be moved. Tune Insight\u2019s solution involved designing an architecture where calculations are performed in close proximity to the data. Lightweight software is installed on the local infrastructure, and only the elements that are absolutely essential for the analysis are extracted, encrypted and sent to the federated network.<\/p>\n<p>It is this choice of architecture that sets Tune Insight apart from the numerous Confidential Computing enclave-based solutions used by the big Cloud providers. While these systems offer a high level of protection, they all present the same insurmountable disadvantage: the results to be aggregated still need to be centralized in a single enclave.<\/p>\n<p>\u201c<em>Confidential Computing needs all the data to be in the same place. Even if the enclave is secure, it\u2019s vastly different from federation.<\/em>\u201d<\/p>\n<p>In an international context where regulations and legislative frameworks differ from country to country, this makes the creation of a federated data space not only relevant, but essential.<\/p>\n<h2>4. A game-changing combination: why Tune Insight is leaving nothing to chance<\/h2>\n<p>Tune Insight\u2019s decision to combine three technologies is not based on one-upmanship or a desire to \u201cgo bigger.\u201d It\u2019s a practical response to a real observation: no single technology is sufficient.<\/p>\n<ul>\n<li>Differential privacy protects individuals but doesn\u2019t allow for multi-party collaboration.<\/li>\n<li>Homomorphic encryption allows collaboration but needs an environment where data doesn\u2019t circulate.<\/li>\n<li>Federation puts a stop to data transmission but doesn\u2019t guarantee anonymization or data security.<\/li>\n<\/ul>\n<p>When applied together, these three elements make it possible to:<\/p>\n<ul>\n<li>Analyze data without ever accessing it,<\/li>\n<li>Collaborate between countries, institutions, and private and public actors,<\/li>\n<li>Guarantee integrated security at every stage,<\/li>\n<li>All while delivering reliable, usable insights.<\/li>\n<\/ul>\n<p>\u201c<em>We want to design elegant systems that minimize data transfer,<\/em>\u201d concludes Romain Bouy\u00e9, summing up the philosophy behind Tune Insight\u2014placing protection at the heart of the solution, without ever sacrificing performance.<\/p>\n<p>The result is not a technology, but a complete architecture, designed to meet the needs of hospitals, the requirements of regulators and the ambitions of researchers. An architecture that will finally allow us to break the stalemate of how to harness the power of data without compromising its confidentiality.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/aside>\n","protected":false},"excerpt":{"rendered":"<p>Three technologies, one vision: using health data without compromising on privacy A new approach to health data As health systems go digital, institutions are producing vast amounts of data \u2013&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1337,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[13,9],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-developpement"],"acf":[],"_links":{"self":[{"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":4,"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"predecessor-version":[{"id":1343,"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/posts\/1336\/revisions\/1343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/media\/1337"}],"wp:attachment":[{"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tuneinsight.com\/en\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}