Use encryption in such a way that the service provider cannot decrypt the user's information because the user manages the keys.