Skip to content

Protected Data

Protected Data refers to any data encrypted using the iExec Data Protector tool. This Turnkey Privacy encryption solution enables users to protect, manage and monetize their data within the Web3 ecosystem effortlessly.

Unlike standard datasets, Protected Data exposes its data types on-chain (indicating types like email addresses or photos). This lets anyone identify entries with matching types.

Key Concepts

Data Governance

  • You own your data: The original data never leaves your control
  • Granular permissions: Decide who can access and use your data
  • Revocable access: Grant and revoke permissions at any time

Privacy-preserving Computation

  • Encrypted Processing: Maintains a complete chain of trust.
  • TEE (Trusted Execution Environment): Secure enclaves protect data during processing
  • Secret storage: iExec's protocol secrets in a TEE database.

Monetization

  • Data marketplaces: Sell access to your protected data
  • Usage tracking: Monitor how your data is being used
  • Fair compensation: Get paid for data usage

How it Works

  1. Protect: Encrypt and register your data on the iExec network
  2. Share: Authorize specific users and applications to access your data
  3. Monitor: Track usage and maintain control
  4. Monetize: Earn from your data while keeping it private
  5. Compute: Authorized users can compute on your data with authorized iApp

Use Cases

Personal Data

  • Health records
  • Financial data
  • Personal preferences

Business Intelligence

  • Market research
  • Customer analytics
  • Proprietary datasets

AI Training

  • Training models without exposing sensitive data
  • Federated learning
  • Privacy-preserving ML

Research

  • Collaborative research with privacy guarantees
  • Cross-institutional studies
  • Clinical trial data

Next Steps